Quiz 7 Flashcards

1
Q

A file accompanying an email message is called an _______________.

A

attachment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

According to some estimates, 90 percent of spam is distributed through ____________ networks.

A

bot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Manipulating someone within an organization to gain access to confidential information is called
A) phreaking.
B) trashing.
C) diving.
D) hacking.
E) social engineering.
A

E) social engineering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
The Internet worm was released by
A) Katie Hafner.
B) Robert Morris, Jr..
C) Bruce Sterling.
D) John Barlow.
E) John Markoff.
A

B) Robert Morris, Jr.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A ____________ is a piece of self-replicating code embedded within another program called the host.

A

virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
A software program that responds to commands sent by a command-and-control program located on an external computer is called a
A) bot.
B) spoof.
C) worm.
D) virus.
E) vampire
A

A) bot.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The Conficker worm is notable because
A) All of the above.
B) it is Cuba’s first attempt at cyberwarfare.
C) it is the fastest spreading worm of all time.
D) computer experts have found it particularly difficult to eradicate.
E) it shut down the White House Web site for three days.

A

D) computer experts have found it particularly difficult to eradicate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
An intentional action designed to prevent legitimate users from making use of a computer service is called
A) phreaking.
B) a bombing run.
C) a curtain closer.
D) an electronic overdose.
E) a denial-of-service attack.
A

E) a denial-of-service attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Determining that a person is who he or she claims to be on a computer is called
A) accountability.
B) debugging.
C) authorization.
D) social engineering.
E) authentication.
A

E) authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
The process of determining that a user has permission to perform a particular action on a computer is called
A) authorization.
B) accountability.
C) debugging.
D) social engineering.
E) authentication.
A

A) authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Vote-counting irregularities in the State of _____________ in the 2000 U.S. Presidential election led to more interest in computerized voting systems.

A

Florida

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
A program with a benign capability that conceals another, sinister purpose is called a
A) worm.
B) rogue.
C) hack.
D) Trojan horse.
E) virus.
A

D) Trojan horse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
A piece of self-replicating code embedded within another program is called a
A) worm.
B) Trojan horse.
C) rogue.
D) hack.
E) virus.
A

E) virus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
A self-contained program that spreads through a computer network by exploiting security holes is called a
A) hack.
B) worm.
C) rogue.
D) Trojan horse.
E) virus.
A

B) worm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A ___________ is a self-contained program that spreads through a computer network by exploiting security holes in the computers connected to the network.

A

worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The ______________________________ criminalizes a wide variety of hacker-related activities.

A

Computer Fraud and Abuse Act

17
Q

The manipulation of a person inside an organization to gain access to confidential information is called __________________.

A

social engineering

18
Q

A __________________ is a computer, positioned between a local network and the Internet, that monitors the packets flowing in and out.

A

firewall

19
Q

An intentional action designed to prevent legitimate users from making use of a computer service is called a _________________________.

A

denial-of-service (DoS) attack

20
Q
You may find a virus
A) in an email attachment.
B) on a floppy disk.
C) on a CD-ROM.
D) on a hard disk.
E) All of these
A

E) All of these