chapter-9 (2).rtf

5 Pages
Unlock Document

Concordia University
Business Technology Management
BTM 481
Raul Valverde

COSC 101 COMPUTER LITERACY CHAPTER 9 QUIZ Name_________________________ MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) A ________ is a secure Internet pathway that large corporations use to protect sensitive data.1) _______ A) WAN B) HAN C) LAN D) VPN 2) Which of the following is formally defined as any criminal action perpetrated primarily throug2) _______ the use of a computer? A) hacking B) phishing C) social networking D) cybercrime 3) A majority of online credit card fraud results from: 3) _______ A) computer intrusions. B) unsolicited e-mail. C) phishing. D) auction fraud. 4) A computer virus normally attaches itself to another computer program known as a: 4) _______ A) host program. B) Trojan horse. C) target program. D) backdoor program. 5) A ________ is a virus that is triggered when certain conditions are met, such as a file openin5) _______ starting a program a certain number of times. A) Trojan horse B) boot-sector virus C) time bomb D) logic bomb 6) Which type of virus was the famous Michelangelo virus? 6) _______ A) an e-mail virus B) a worm C) a script virus D) a time bomb 7) Which of the following classifications of viruses can change its own code? 7) _______ A) stealth B) worm C) multipartite D) polymorphic 8) A ________ works independently of host file execution and is much more active in spreading 8) _______ itself than a virus is. A) time bomb B) logic bomb C) DDoS D) worm 9) A(n) ________ virus temporarily erases its code from the files where they reside and then hide9) _______ in the computer's active memory. A) macro B) e-mail C) logic D) stealth 10) With regard to computer protection, quarantining is defined as: 10) ______ A) repairing the infected file. B) placing a found virus in a secure area on the hard drive. C) updating your antivirus software. D) deleting the infected file. 11) During the process of ________ the antivirus software records key attributes about the files o11) ______ your computer and keeps these statistics in a safe place on your hard drive. A) inoculation B) encryption C) quarantining D) scanning 12) A(n) ________ is the portion of virus code that is unique to a particular computer virus. 12) ______ A) encryption code B) compression code C) virus pattern D) virus signature 13) Drive-by downloads occur when: 13) ______ A) software is downloaded to your computer after opening an e-mail attachment. B) a Web site downloads harmful software onto your computer. C) a macro virus downloads unwanted programs to your computer. D) a hacker gains access to your wireless network. 14) A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT: 14) ______ A) assume your identity. B) steal your logon and passwords for various accounts. C) use your debit card information to purchase items illegally. D) launch a denial of service (DoS) attack on your computer. 15) Which of the following is a program that appears to be something useful or desirable but does 15) ______ something malicious in the background? A) a Trojan horse B) a zombie C) a worm D) a virus 16) ________ floods a computer with requests until it shuts down and refuses to answer any 16) ______ requests for information. A) A polymorphic virus B) A Trojan horse C) Port blocking D) A DDoS attack 17) The most likely method a hacker would use to access a computer is 17) ______ A) sitting down at a computer and installing hacking software. B) entering through the Internet. C) entering through a company intranet. D) overhearing your password and/or log-on information. 18) Rules for creating passwords include all of the following EXCEPT: 18) ______ A) change your password frequently. B) keep your password written down and stored in any easy-to-remember location. C) create a hard-to-guess password, with a combination of letters and numbers. D) keep your password a secret. 19) You can block logical ports to invaders and make your computer invisible to others on the 19) ______ Internet by installing: A) antivirus software. B) a firewall. C) a packet sniffer. D) a packet filter. 20) ________ makes broadband users more vulnerable to attacks. 20) ______ A) Static addressing B) Packet filtering C) Dynamic addressing D) Greater bandwidth 21) The purpose of network address translation (NAT) is to: 21) ______ A) translate IP addresses from the Internet. B) hide user IP addresses from the Internet. C) dynamically assign IP addresses via an ISP. D) convert logical ports to physical port configurations. 22) ________ occurs when a hacker takes control of a Bluetooth-enabled device to make phone calls, 22) ______ read phonebook entries, send and receive text messages, and more. A) Bluestealing B) Bluebugging C) Bluesnarfing D) Bluebombing 23) Configuring a firewall to ignore all incoming packets that request access to a specific port is 23) ______ known as: A) static addressing. B) packet switching. C) packet filtering. D) logical port blocking. 24) Many ________ sold for home use are also configured as firewalls and are capable of performing 24) ______ network address translation (NAT). A) modems B) rout
More Less

Related notes for BTM 481

Log In


Don't have an account?

Join OneClass

Access over 10 million pages of study
documents for 1.3 million courses.

Sign up

Join to view


By registering, I agree to the Terms and Privacy Policies
Already have an account?
Just a few more details

So we can recommend you notes for your school.

Reset Password

Please enter below the email address you registered with and we will send you a link to reset your password.

Add your courses

Get notes from the top students in your class.