Name: 
 

CMT - Chapter 19



True/False
Indicate whether the statement is true or false.
 

 1. 

Authorization proves that an individual is who he says he is.
 

 2. 

You can share both encrypted folders and encrypted files.
 

 3. 

A program infected with a virus must be executed for the virus to run.
 

 4. 

A multipartite virus is a combination of a boot sector virus and a file virus and can hide in either.
 

 5. 

A script virus hides in the boot sector program of a hard drive or floppy disk or in the master boot program in the Master Boot Record (MBR).
 

Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 6. 

A strong password should ____.
a.
combine uppercase and lowercase characters
b.
use consecutive letters or numbers
c.
contain at least 6 characters
d.
All of the above
 

 7. 

At a command prompt, you can use the ____ command to control how user accounts can access files and folders.
a.
Cacls
c.
Cont
b.
Perm
d.
Acc
 

 8. 

To limit the potential damage from malware, it’s a good idea to create a(n) ____ account to use for your everyday normal computer activities.
a.
Administrator
c.
Backup Operator
b.
Limited User
d.
Guest
 

 9. 

An alternative e-mail client to Microsoft Outlook and Outlook Express is ____.
a.
Eudora
c.
Opera
b.
Firefox
d.
Internet Explorer
 

 10. 

____ puts data into code that must be translated before it can be accessed, and can be applied to either a folder or file.
a.
Authorization
c.
Encapsulation
b.
Authentication
d.
Encryption
 

 11. 

____ is a type of identity theft where the sender of an e-mail message scams you into responding with personal data about yourself.
a.
Scam e-mail
c.
Virus hoax
b.
Phishing
d.
Guerilla marketing
 

 12. 

A(n) ____ is e-mail that does damage by tempting you to forward it to everyone in your e-mail address book with the intent of clogging up e-mail systems or to delete a critical Windows system file by convincing you the file is malicious.
a.
scam e-mail
c.
virus hoax
b.
phishing e-mail
d.
e-mail virus
 

 13. 

____ by BillP Studios is a third-party monitoring tool that is used to monitor the startup processes and let you know when installation software attempts to add something to your startup routines.
a.
DiskWizard
c.
Ad-Aware
b.
Spybot
d.
WinPatrol
 

 14. 

____ is moving data from one application to another application or from one storage media to another, and most often involves a change in the way the data is formatted.
a.
Encryption
c.
Data transformation
b.
Data migration
d.
Polymorphism
 

 15. 

The protocols used to encrypt account names and passwords are called ____ protocols.
a.
user service
c.
authentication
b.
encryption
d.
authorization
 

 16. 

Digital certificates are transported over the Internet and verified using ____ standards.
a.
EFS
c.
AV
b.
PKI
d.
CHAP
 

 17. 

____ displays pop-up ads based on your browsing habits.
a.
Adware
c.
Virus
b.
Spyware
d.
Spam
 

 18. 

____ is junk e-mail that you don’t want, that you didn’t ask for, and that gets in your way.
a.
Adware
c.
A virus
b.
Spyware
d.
Spam
 

 19. 

A(n) ____ is a program that copies itself throughout a network or the Internet without a host program.
a.
adware
c.
virus
b.
spyware
d.
worm
 

 20. 

A ____ is dormant code added to software and triggered at a predetermined time or by a predetermined event.
a.
logic bomb
c.
virus
b.
Trojan horse
d.
worm
 

 21. 

A ____ does not need a host program to work; rather, it substitutes itself for a legitimate program.
a.
logic bomb
c.
virus
b.
Trojan horse
d.
browser hijacker
 

 22. 

A ____ virus hides in an executable program or in a word-processing document that contains a macro.
a.
boot sector
c.
script
b.
file
d.
multipartite
 

 23. 

A ____ is a small program contained in a document that can be automatically executed either when the document is first loaded or later by pressing a key combination.
a.
boot sector virus
c.
macro
b.
file virus
d.
multipartite virus
 

 24. 

As a ____ virus replicates, it changes its characteristics.
a.
stealth
c.
script
b.
polymorphic
d.
multipartite
 

 25. 

Some viruses can continually transform themselves so they will not be detected by AV software that is looking for a particular characteristic. A virus that uses this technique is called a(n) ____ virus.
a.
encrypting
c.
script
b.
stealth
d.
multipartite
 

 26. 

A ____ loads itself before the OS boot is complete and hijacks internal Windows components so that it masks information Windows provides to user-mode utilities such as Task Manager, Explorer, the Registry Editor, and AV software.
a.
Trojan horse
c.
stealth virus
b.
worm
d.
rootkit
 

Completion
Complete each statement.
 

 27. 

____________________ determines what an individual can do in the system after he or she is authenticated.
 

 

 28. 

Antivirus (AV) software detects a known virus by looking for distinguishing characteristics called ____________________.
 

 

 29. 

A(n) ____________________ utility fills every sector on a drive with zeroes.
 

 

 30. 

A(n) ____________________ does mischief by changing your home page and other browser settings.
 

 

 31. 

A(n) ____________________ tracks all your keystrokes, including passwords, chat room sessions, e-mail messages, documents, online purchases, and anything else you type on your PC.
 

 

Matching
 
 
Identify the letter of the choice that best matches the phrase or definition.
a.
virus
f.
packet
b.
key fob
g.
spyware
c.
adware
h.
ActiveX control
d.
passphrase
i.
dialer
e.
malware
 

 32. 

Made up of several words with spaces allowed
 

 33. 

A small program that can be downloaded by a Web site to your computer
 

 34. 

A segment of data sent over a network connection
 

 35. 

A type of smart card
 

 36. 

Any unwanted program that means you harm and is transmitted to your computer without your knowledge
 

 37. 

A program that replicates by attaching itself to other programs
 

 38. 

Produces unwanted pop-up ads
 

 39. 

Software that installs itself on your computer to spy on you, and collects personal information about you that it transmits over the Internet to Web-hosting sites that intend to use your personal data for harm
 

 40. 

Software installed on your PC that disconnects your phone line from your ISP and dials up an expensive pay-per-minute phone number without your knowledge
 



 
Check Your Work     Start Over