COSC 101 COMPUTER LITERACY
CHAPTER 9 QUIZ
MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.
1) A ________ is a secure Internet pathway that large corporations use to protect sensitive data.1) _______
A) WAN B) HAN C) LAN D) VPN
2) Which of the following is formally defined as any criminal action perpetrated primarily throug2) _______
the use of a computer?
A) hacking B) phishing
C) social networking D) cybercrime
3) A majority of online credit card fraud results from: 3) _______
A) computer intrusions. B) unsolicited e-mail.
C) phishing. D) auction fraud.
4) A computer virus normally attaches itself to another computer program known as a: 4) _______
A) host program. B) Trojan horse.
C) target program. D) backdoor program.
5) A ________ is a virus that is triggered when certain conditions are met, such as a file openin5) _______
starting a program a certain number of times.
A) Trojan horse B) boot-sector virus
C) time bomb D) logic bomb
6) Which type of virus was the famous Michelangelo virus? 6) _______
A) an e-mail virus B) a worm C) a script virus D) a time bomb
7) Which of the following classifications of viruses can change its own code? 7) _______
A) stealth B) worm C) multipartite D) polymorphic
8) A ________ works independently of host file execution and is much more active in spreading 8) _______
itself than a virus is.
A) time bomb B) logic bomb C) DDoS D) worm
9) A(n) ________ virus temporarily erases its code from the files where they reside and then hide9) _______
in the computer's active memory.
A) macro B) e-mail C) logic D) stealth
10) With regard to computer protection, quarantining is defined as: 10) ______
A) repairing the infected file.
B) placing a found virus in a secure area on the hard drive.
C) updating your antivirus software.
D) deleting the infected file.
11) During the process of ________ the antivirus software records key attributes about the files o11) ______
your computer and keeps these statistics in a safe place on your hard drive.
A) inoculation B) encryption C) quarantining D) scanning
12) A(n) ________ is the portion of virus code that is unique to a particular computer virus. 12) ______
A) encryption code B) compression code C) virus pattern D) virus signature
13) Drive-by downloads occur when: 13) ______
A) software is downloaded to your computer after opening an e-mail attachment.
B) a Web site downloads harmful software onto your computer.
C) a macro virus downloads unwanted programs to your computer.
D) a hacker gains access to your wireless network.
14) A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT: 14) ______
A) assume your identity.
B) steal your logon and passwords for various accounts.
C) use your debit card information to purchase items illegally.
D) launch a denial of service (DoS) attack on your computer.
15) Which of the following is a program that appears to be something useful or desirable but does 15) ______
something malicious in the background?
A) a Trojan horse B) a zombie C) a worm D) a virus
16) ________ floods a computer with requests until it shuts down and refuses to answer any 16) ______
requests for information.
A) A polymorphic virus B) A Trojan horse
C) Port blocking D) A DDoS attack
17) The most likely method a hacker would use to access a computer is 17) ______
A) sitting down at a computer and installing hacking software.
B) entering through the Internet.
C) entering through a company intranet.
D) overhearing your password and/or log-on information.
18) Rules for creating passwords include all of the following EXCEPT: 18) ______
A) change your password frequently.
B) keep your password written down and stored in any easy-to-remember location.
C) create a hard-to-guess password, with a combination of letters and numbers.
D) keep your password a secret.
19) You can block logical ports to invaders and make your computer invisible to others on the 19) ______
Internet by installing:
A) antivirus software. B) a firewall.
C) a packet sniffer. D) a packet filter.
20) ________ makes broadband users more vulnerable to attacks. 20) ______
A) Static addressing B) Packet filtering
C) Dynamic addressing D) Greater bandwidth
21) The purpose of network address translation (NAT) is to: 21) ______
A) translate IP addresses from the Internet.
B) hide user IP addresses from the Internet.
C) dynamically assign IP addresses via an ISP.
D) convert logical ports to physical port configurations.
22) ________ occurs when a hacker takes control of a Bluetooth-enabled device to make phone calls, 22) ______
read phonebook entries, send and receive text messages, and more. A) Bluestealing B) Bluebugging C) Bluesnarfing D) Bluebombing
23) Configuring a firewall to ignore all incoming packets that request access to a specific port is 23) ______
A) static addressing. B) packet switching.
C) packet filtering. D) logical port blocking.
24) Many ________ sold for home use are also configured as firewalls and are capable of performing 24) ______
network address translation (NAT).
A) modems B) rout