|
1 | | Which of the following refers to software designed to harm your computer or computer security, engage in criminal activity, or compromise resources in some way? |
| | A) | Adware |
| | B) | Malware |
| | C) | Systems software |
| | D) | Application software |
|
|
|
2 | | Which of the following is a computer virus that replicates and spreads itself, not only from file to file, but from computer to computer via e-mail and other Internet traffic? |
| | A) | A worm |
| | B) | A zombie |
| | C) | A rootkit |
| | D) | A botnet |
|
|
|
3 | | A botnet is: |
| | A) | a computer virus that replicates and spreads itself from computer to computer via e-mail and other Internet traffic. |
| | B) | software that gives you administrator rights to a computer or network. |
| | C) | an exact copy or snapshot of the contents of an electronic medium. |
| | D) | a collection of computers that have been infected with blocks of code that can run automatically by themselves. |
|
|
|
4 | | Which of the following is a type of virus that hides inside other software, usually an attachment or download? |
| | A) | A zombie |
| | B) | A worm |
| | C) | A Trojan horse |
| | D) | A botnet |
|
|
|
5 | | Which of the following refers to the forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender? |
| | A) | Spoofing |
| | B) | Redacting |
| | C) | Spamming |
| | D) | Pharming |
|
|
|
6 | | Which of the following is software that allows you to gain administrative rights to someone's computer? |
| | A) | A bot |
| | B) | A worm |
| | C) | A rootkit |
| | D) | A Trojan horse |
|
|
|
7 | | What is a computer called when it is infected with a malware bot? |
| | A) | A zombie |
| | B) | An android |
| | C) | A worm |
| | D) | A Trojan horse |
|
|
|
8 | | Hackers who legitimately, with the knowledge of the owners of the IT system, try to break in to find and fix vulnerable areas of the system are called _____. |
| | A) | thrill-seeker hackers |
| | B) | hacktivists |
| | C) | script kiddies |
| | D) | counter hackers |
|
|
|
9 | | In a hard disk, _____ is the set of clusters that have been marked as available to store information, but have not yet received a file or files. |
| | A) | registry space |
| | B) | slack space |
| | C) | unallocated space |
| | D) | erased information |
|
|
|
10 | | Which of the following refers to blacking out portions of the document, usually to protect confidential information, so that it cannot be recovered later? |
| | A) | Redacting |
| | B) | Encrypting |
| | C) | Spoofing |
| | D) | Defacing |
|
|