1. A computer security risk is defined as any event or action that could cause loss of, or damage to, ____.
a. computer equipment b. software
c. data and information d. all of the above
ANSWER: d
REFERENCES: 412
2. All of the following are true concerning viruses like those described in the accompanying figure EXCEPT ____.
a. viruses are potentially damaging computer programs
b. a virus is a segment of a program
c. many viruses are generated by chance
d. damage caused by a virus is called the virus payload
ANSWER: c
REFERENCES: 412-413
3. A ____ virus replaces the program that is used to start the computer system with a modified, infected version of the startup program.
a. boot sector b. file
c. Trojan horse d. macro
ANSWER: a
REFERENCES: 413
4. A ____ virus inserts virus code into program files.
a. boot sector b. file
c. Trojan horse d. macro
ANSWER: b
REFERENCES: 413
5. A ____ virus hides within or is designed to look like a legitimate program.
a. boot sector b. file
c. Trojan horse d. macro
ANSWER: c
REFERENCES: 413
6. A ____ virus hides virus code within an application such as a word processing or spreadsheet document.
a. malicious b. file
c. Trojan horse d. macro
ANSWER: d
REFERENCES: 413
7. A ____ is a program that is activated when a certain condition is detected.
a. logic bomb b. worm
c. time bomb d. macro virus
ANSWER: a
REFERENCES: 414
8. A ____ is a program that is activated on a specific date.
a. logic bomb b. worm
c. time bomb d. macro virus
ANSWER: c
REFERENCES: 414
9. A well-known time bomb virus is the ____ virus, which destroys files on March 6.
a. da Vinci b. Michelangelo
c. Spring Fever d. Green Caterpillar
ANSWER: b
REFERENCES: 414
10. Antivirus programs like the one in the accompanying figure also are called ____.
a. vaccines b. computer medicine
c. virus remedy d. virus fixers
ANSWER: a
REFERENCES: 416
11. In addition to detecting viruses and inoculating against them, antivirus programs like the one in the accompanying figure can ____.
a. repair infected programs and files b. protect against power surges
c. protect against unauthorized access d. all of the above
ANSWER: a
REFERENCES: 416
12. A(n) ____ disc is normally a CD that contains an uninfected copy of key operating system commands and startup information that enables the computer to restart correctly; this kind of disc may be required in some circumstances by the program in the accompanying figure.
a. antivirus b. rescue
c. fix-it d. virus fix
ANSWER: b
REFERENCES: 416
13. ____ is the use of a computer system without permission.
a. Access controls b. Unauthorized use
c. Unauthorized access d. Biometric trespass
ANSWER: c
REFERENCES: 417
14. ____ is the use of a computer or data for unapproved or possibly illegal activities.
a. Access control b. Unauthorized use
c. Unauthorized access d. Biometic trespass
ANSWER: b
REFERENCES: 417
15. All of the following are tips for creating passwords EXCEPT ____.
a. join two words together b. use a close relative or your child’s name
c. choose words from other languages d. use a combination of letters and numbers
ANSWER: b
REFERENCES: 418
16. Any item that you must carry to gain access to a computer or computer facility is called a(n) ____.
a. proxy object b. possessed object
c. access object d. smart object
ANSWER: b
REFERENCES: 418
17. A security system consisting of hardware and/or software that prevents unauthorized access to data and information on a network is called a(n) ____.
a. proxy b. firewall
c. blocker d. defender
ANSWER: b
REFERENCES: 419
18. The most common type of software theft is ____.
a. stealing a CD b. stealing a flash drive
c. software piracy d. all of the above
ANSWER: c
REFERENCES: 420
Reviews
There are no reviews yet.