Site MapHelpFeedbackMultiple Choice Quiz 14A
Multiple Choice Quiz 14A
(See related pages)



1

A __________ is anything that can cause harm.
A)vulnerability
B)phish
C)threat
D)spoof
2

In the right setting a thief will steal your information by simply watching what you type.
A)snagging
B)spying
C)social engineering
D)shoulder surfing
3

A __________ is a small program embedded inside of a GIF image.
A)web bug
B)cookie
C)spyware application
D)spam
4

A hacker contacts you my phone or email and attempts to acquire your password.
A)spoofing
B)phishing
C)spamming
D)bugging
5

This power protection device includes a battery that provides a few minutes of power.
A)surge suppressor
B)line conditioner
C)generator
D)UPS
6

The phrase __________ describes viruses, worms, Trojan horse attack applets, and attack scripts.
A)malware
B)spam
C)phish
D)virus
7

A hacker that changes or forges information in an electronic resource, is engaging in __________.
A)denial of service
B)sniffing
C)terrorism
D)data diddling
8

Hackers often gain entry to a network be pretending to be at a legitimate computer.
A)spoofing
B)forging
C)IP spoofing
D)ID theft
9

The __________ of a threat measures its potential impact on a system.
A)vulnerabilities
B)countermeasures
C)degree of harm
D)susceptibility
10

The power level drops below 120V.
A)brownout
B)spike
C)blackout
D)surge







Norton IntroOnline Learning Center

Home > Chapter 14 > Multiple Choice Quiz 14A