Site MapHelpFeedbackMultiple Choice Quiz
Multiple Choice Quiz
(See related pages)

1
Which of the following refers to software designed to harm your computer or computer security, engage in criminal activity, or compromise resources in some way?
A)Adware
B)Malware
C)Systems software
D)Application software
2
Which of the following is a computer virus that replicates and spreads itself, not only from file to file, but from computer to computer via e-mail and other Internet traffic?
A)A worm
B)A zombie
C)A rootkit
D)A botnet
3
A botnet is:
A)a computer virus that replicates and spreads itself from computer to computer via e-mail and other Internet traffic.
B)software that gives you administrator rights to a computer or network.
C)an exact copy or snapshot of the contents of an electronic medium.
D)a collection of computers that have been infected with blocks of code that can run automatically by themselves.
4
Which of the following is a type of virus that hides inside other software, usually an attachment or download?
A)A zombie
B)A worm
C)A Trojan horse
D)A botnet
5
Which of the following refers to the forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender?
A)Spoofing
B)Redacting
C)Spamming
D)Pharming
6
Which of the following is software that allows you to gain administrative rights to someone's computer?
A)A bot
B)A worm
C)A rootkit
D)A Trojan horse
7
What is a computer called when it is infected with a malware bot?
A)A zombie
B)An android
C)A worm
D)A Trojan horse
8
Hackers who legitimately, with the knowledge of the owners of the IT system, try to break in to find and fix vulnerable areas of the system are called _____.
A)thrill-seeker hackers
B)hacktivists
C)script kiddies
D)counter hackers
9
In a hard disk, _____ is the set of clusters that have been marked as available to store information, but have not yet received a file or files.
A)registry space
B)slack space
C)unallocated space
D)erased information
10
Which of the following refers to blacking out portions of the document, usually to protect confidential information, so that it cannot be recovered later?
A)Redacting
B)Encrypting
C)Spoofing
D)Defacing







Management Information SystemsOnline Learning Center

Home > Module H > Multiple Choice Quiz