True/False Indicate whether the
statement is true or false.
|
|
1.
|
Authorization proves that an individual is who he says he is.
|
|
2.
|
You can share both encrypted folders and encrypted files.
|
|
3.
|
A program infected with a virus must be executed for the virus to run.
|
|
4.
|
A multipartite virus is a combination of a boot sector virus and a file virus
and can hide in either.
|
|
5.
|
A script virus hides in the boot sector program of a hard drive or floppy disk
or in the master boot program in the Master Boot Record (MBR).
|
Multiple Choice Identify the
choice that best completes the statement or answers the question.
|
|
6.
|
A strong password should ____.
a. | combine uppercase and lowercase characters | b. | use consecutive
letters or numbers | c. | contain at least 6
characters | d. | All of the above |
|
|
7.
|
At a command prompt, you can use the ____ command to control how user accounts
can access files and folders.
|
|
8.
|
To limit the potential damage from malware, it’s a good idea to create
a(n) ____ account to use for your everyday normal computer activities.
a. | Administrator | c. | Backup Operator | b. | Limited User | d. | Guest |
|
|
9.
|
An alternative e-mail client to Microsoft Outlook and Outlook Express is
____.
a. | Eudora | c. | Opera | b. | Firefox | d. | Internet
Explorer |
|
|
10.
|
____ puts data into code that must be translated before it can be accessed, and
can be applied to either a folder or file.
a. | Authorization | c. | Encapsulation | b. | Authentication | d. | Encryption |
|
|
11.
|
____ is a type of identity theft where the sender of an e-mail message scams you
into responding with personal data about yourself.
a. | Scam e-mail | c. | Virus hoax | b. | Phishing | d. | Guerilla
marketing |
|
|
12.
|
A(n) ____ is e-mail that does damage by tempting you to forward it to everyone
in your e-mail address book with the intent of clogging up e-mail systems or to delete a critical
Windows system file by convincing you the file is malicious.
a. | scam e-mail | c. | virus hoax | b. | phishing e-mail | d. | e-mail virus |
|
|
13.
|
____ by BillP Studios is a third-party monitoring tool that is used to monitor
the startup processes and let you know when installation software attempts to add something to your
startup routines.
a. | DiskWizard | c. | Ad-Aware | b. | Spybot | d. | WinPatrol |
|
|
14.
|
____ is moving data from one application to another application or from one
storage media to another, and most often involves a change in the way the data is formatted.
a. | Encryption | c. | Data transformation | b. | Data migration | d. | Polymorphism |
|
|
15.
|
The protocols used to encrypt account names and passwords are called ____
protocols.
a. | user service | c. | authentication | b. | encryption | d. | authorization |
|
|
16.
|
Digital certificates are transported over the Internet and verified using ____
standards.
|
|
17.
|
____ displays pop-up ads based on your browsing habits.
a. | Adware | c. | Virus | b. | Spyware | d. | Spam |
|
|
18.
|
____ is junk e-mail that you don’t want, that you didn’t ask for,
and that gets in your way.
a. | Adware | c. | A virus | b. | Spyware | d. | Spam |
|
|
19.
|
A(n) ____ is a program that copies itself throughout a network or the Internet
without a host program.
a. | adware | c. | virus | b. | spyware | d. | worm |
|
|
20.
|
A ____ is dormant code added to software and triggered at a predetermined time
or by a predetermined event.
a. | logic bomb | c. | virus | b. | Trojan horse | d. | worm |
|
|
21.
|
A ____ does not need a host program to work; rather, it substitutes itself for a
legitimate program.
a. | logic bomb | c. | virus | b. | Trojan horse | d. | browser
hijacker |
|
|
22.
|
A ____ virus hides in an executable program or in a word-processing document
that contains a macro.
a. | boot sector | c. | script | b. | file | d. | multipartite |
|
|
23.
|
A ____ is a small program contained in a document that can be automatically
executed either when the document is first loaded or later by pressing a key combination.
a. | boot sector virus | c. | macro | b. | file virus | d. | multipartite
virus |
|
|
24.
|
As a ____ virus replicates, it changes its characteristics.
a. | stealth | c. | script | b. | polymorphic | d. | multipartite |
|
|
25.
|
Some viruses can continually transform themselves so they will not be detected
by AV software that is looking for a particular characteristic. A virus that uses this technique is
called a(n) ____ virus.
a. | encrypting | c. | script | b. | stealth | d. | multipartite |
|
|
26.
|
A ____ loads itself before the OS boot is complete and hijacks internal Windows
components so that it masks information Windows provides to user-mode utilities such as Task Manager,
Explorer, the Registry Editor, and AV software.
a. | Trojan horse | c. | stealth virus | b. | worm | d. | rootkit |
|
Completion Complete each
statement.
|
|
27.
|
____________________ determines what an individual can do in the system after he
or she is authenticated.
|
|
28.
|
Antivirus (AV) software detects a known virus by looking for distinguishing
characteristics called ____________________.
|
|
29.
|
A(n) ____________________ utility fills every sector on a drive with
zeroes.
|
|
30.
|
A(n) ____________________ does mischief by changing your home page and other
browser settings.
|
|
31.
|
A(n) ____________________ tracks all your keystrokes, including passwords, chat
room sessions, e-mail messages, documents, online purchases, and anything else you type on your
PC.
|
Matching
|
|
|
Identify the letter of the choice that best matches the phrase or
definition. a. | virus | f. | packet | b. | key
fob | g. | spyware | c. | adware | h. | ActiveX control | d. | passphrase | i. | dialer | e. | malware |
|
|
32.
|
Made up of several words with spaces allowed
|
|
33.
|
A small program that can be downloaded by a Web site to your computer
|
|
34.
|
A segment of data sent over a network connection
|
|
35.
|
A type of smart card
|
|
36.
|
Any unwanted program that means you harm and is transmitted to your computer
without your knowledge
|
|
37.
|
A program that replicates by attaching itself to other programs
|
|
38.
|
Produces unwanted pop-up ads
|
|
39.
|
Software that installs itself on your computer to spy on you, and collects
personal information about you that it transmits over the Internet to Web-hosting sites that intend
to use your personal data for harm
|
|
40.
|
Software installed on your PC that disconnects your phone line from your ISP
and dials up an expensive pay-per-minute phone number without your knowledge
|