Long Exam 3 For Itefund X01

100 Questions

Settings
Please wait...
Long Exam 3 For Itefund X01


Questions and Answers
  • 1. 
    ____ provide Internet access and have many members-only features that offer a variety of special content and services.
    • A. 

      ISPs

    • B. 

      LANs

    • C. 

      OSPs

    • D. 

      Networks

  • 2. 
    ___ provide wireless Internet access to users with wireless modems or Web-enabled handheld computers or devices.
    • A. 

      ISPs

    • B. 

      WSPs

    • C. 

      OSPs

    • D. 

      WANs

  • 3. 
    The domain name in the URL http://www.scsite.com/dc2003/ch2 is ____.
    • A. 

      Http://

    • B. 

      Www.scsite.com/

    • C. 

      Dc2002/

    • D. 

      Ch2

  • 4. 
    ____ program reads pages on Web sites in order to create an index of hits.
    • A. 

      Engine

    • B. 

      Directory

    • C. 

      Catalog

    • D. 

      Crawler

  • 5. 
    Web pages that list as the result of a search are called ____.
    • A. 

      Finds

    • B. 

      Spiders

    • C. 

      Hits

    • D. 

      Keywords

  • 6. 
    A built-in connection to another related Web page or part of a Web page is called a ____.
    • A. 

      Browser

    • B. 

      Hit

    • C. 

      Hyperlink

    • D. 

      Jump

  • 7. 
    When you want to transfer files between computers, the best Internet service to use is
    • A. 

      Instant Messaging

    • B. 

      FTP

    • C. 

      Chat

    • D. 

      Usenet

  • 8. 
    In networking, bandwidth refers to
    • A. 

      The speed at which a modem can operate

    • B. 

      The storage capacity of your email account

    • C. 

      The protocols used for Internet information

    • D. 

      The carrying capacity of the transmission media for sending information

  • 9. 
    If you want to connect your home computer so that you can view your school's website, in addition to your computer and modem you will need
    • A. 

      DSL, a browser, and the correct protocols

    • B. 

      An ISDN line, Windows, and an ISP

    • C. 

      Both an ISDN and DSL line and a browser.

    • D. 

      An ISP, browser, and your school's URL

  • 10. 
    Listservers are useful in helping teachers keep up with new ideas by:
    • A. 

      Allowing real-time, live chats between subscribers

    • B. 

      Listing new services on a community bulletin board

    • C. 

      Automatically sending information to your email box

    • D. 

      None of the above

  • 11. 
    • A. 

      Spyware

    • B. 

      Virus

    • C. 

      Firewall

    • D. 

      Trojan Horse

  • 12. 
    • A. 

      Anti-spammer

    • B. 

      Email guard

    • C. 

      Virus filter

    • D. 

      Spam filter

  • 13. 
    • A. 

      Social Engineering

    • B. 

      Fraud

    • C. 

      Phishing

    • D. 

      Dumpster Driving

  • 14. 
    • A. 

      Viruses

    • B. 

      Unauthenticated interactive logins from the outside world

    • C. 

      Fire

    • D. 

      Connecting to and from the outside world

  • 15. 
    • A. 

      Password

    • B. 

      J*p2le04>F

    • C. 

      Your real name, user name, or company name

    • D. 

      Your birthdate

  • 16. 
    The majority of computer crimes are committed by:
    • A. 

      Hackers

    • B. 

      Insiders

    • C. 

      Overseas criminals

    • D. 

      Young teenage computer genius

  • 17. 
    The common name for the crime of stealing passwords is:
    • A. 

      Spooling

    • B. 

      Identity theft

    • C. 

      Spoofing

    • D. 

      Hacking

  • 18. 
    Collecting personal information and effectively posing as another individual is known as the crime of:
    • A. 

      Spooling

    • B. 

      Identity theft

    • C. 

      Spoofing

    • D. 

      Hacking

  • 19. 
    A program that performs a useful task while simultaneously allowing destructive acts is a:
    • A. 

      Worm

    • B. 

      Trojan Horse

    • C. 

      Virus

    • D. 

      Macro virus

  • 20. 
    An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:
    • A. 

      Trojan horse

    • B. 

      Virus

    • C. 

      Time-bomb

    • D. 

      Malware

  • 21. 
    • A. 

      Time bomb

    • B. 

      Worm

    • C. 

      Melissa Virus (I LOVE YOU VIRUS)

    • D. 

      Macro virus

  • 22. 
    • A. 

      A Virus

    • B. 

      Spybot

    • C. 

      Logic Bomb

    • D. 

      Security patch

  • 23. 
    HTML viruses infect:
    • A. 

      Your computer

    • B. 

      A web page in HTML code

    • C. 

      Both a Web page and the computer that is viewing it

    • D. 

      None of the above

  • 24. 
    When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as:
    • A. 

      Viruses

    • B. 

      Trojan Horse

    • C. 

      Cracking

    • D. 

      A denial of service attack

  • 25. 
    ___ is the measurement of things such as fingerprints and retinal scans used for security access.
    • A. 

      Biometrics

    • B. 

      Biomeasurement

    • C. 

      Computer Security

    • D. 

      Smart weapon machinery

  • 26. 
    • A. 

      User logins

    • B. 

      Passwords

    • C. 

      Computer keys

    • D. 

      Access-control Software

  • 27. 
    The most common passwords in the U.S. or Britain include all EXCEPT:
    • A. 

      Love

    • B. 

      Fred

    • C. 

      God

    • D. 

      123

  • 28. 
    The scrambling of code is known as:
    • A. 

      Encryption

    • B. 

      A firewall

    • C. 

      Scrambling

    • D. 

      Password-proofing

  • 29. 
    If you want to secure a message, use a(n):
    • A. 

      Cryptology source

    • B. 

      Encryption key

    • C. 

      Encryption software package

    • D. 

      Cryptosystem

  • 30. 
    _____ is defined as any crime completed through the use of computer technology.
    • A. 

      Computer forensics

    • B. 

      Computer Crimes

    • C. 

      Hacking

    • D. 

      Cracking

  • 31. 
    Most computer systems rely solely on ___________ for authentication.
    • A. 

      Logins

    • B. 

      Passwords

    • C. 

      Encryption

    • D. 

      Lock and key

  • 32. 
    Creating strong computer security to prevent computer crime usually simultaneously helps protect :
    • A. 

      Privacy rights

    • B. 

      Personal ethics

    • C. 

      The number of cookies downloaded to your personal computer

    • D. 

      Personal space

  • 33. 
    In the world of computing, the essential element that controls how computers are used is
    • A. 

      Ethics

    • B. 

      Legal laws

    • C. 

      Security requirements

    • D. 

      Business demands

  • 34. 
    The guidelines for the morally acceptable use of computers in society are
    • A. 

      Computer ethics

    • B. 

      Privacy

    • C. 

      Morality

    • D. 

      Legal systems

  • 35. 
    The issues that deal with the collection and use of data about individuals is
    • A. 

      Access

    • B. 

      Property

    • C. 

      Accuracy

    • D. 

      Privacy

  • 36. 
    The ethical issue concerned with the correctness of data collected is
    • A. 

      Access

    • B. 

      Property

    • C. 

      Exactness

    • D. 

      Privacy

  • 37. 
    The ethical issue that involves who is able to read and use data is
    • A. 

      Access

    • B. 

      Property

    • C. 

      Accuracy

    • D. 

      Privacy

  • 38. 
    Small files that are deposited on a user’s hard drive when they visit a Web site are best described as
    • A. 

      Cookies

    • B. 

      Codes

    • C. 

      Profiles

    • D. 

      Trackers

  • 39. 
    People who gain unauthorized access to computers for the fun of it, but do not intentionally do damage, are __________.
    • A. 

      Employees

    • B. 

      Hackers

    • C. 

      Crackers

    • D. 

      Members of organized crimes

  • 40. 
    A program that migrates through networks and operating systems and attaches itself to different programs and databases is a __________.
    • A. 

      Viruses

    • B. 

      Worms

    • C. 

      Denial-of-service attack

    • D. 

      Damage

  • 41. 
    A program that fills a computer system with self-replicating information thus clogging the system is called a __________.
    • A. 

      Viruses

    • B. 

      Worms

    • C. 

      Denial-of-service attack

    • D. 

      Damage

  • 42. 
    • A. 

      A virus that is designed to destroy your hard drive

    • B. 

      A virus that is designed to frighten people about a nonexistent virus

    • C. 

      a virus that doesn’t attach itself to programs and databases

    • D. 

      a virus that is designed to shut down a server

  • 43. 
    Programs that come into a computer system disguised as something else are called
    • A. 

        spoofers

    • B. 

      loggers

    • C. 

      Defacers

    • D. 

      Trojan Horse

  • 44. 
    An attempt to slow down or stop a computer system or network by flooding the system with requests for information is called a
    • A. 

      Viruses

    • B. 

      Worm

    • C. 

      Denial-of-service attack

    • D. 

      Trojan Horse

  • 45. 
    A fraudulent or deceptive act or operation designed to trick individuals into spending their time and money for little or no return is called a
    • A. 

      Annoyance

    • B. 

      Worm

    • C. 

      Attack

    • D. 

      Scam

  • 46. 
    Which of the following would best fit the following description – software is copied and given to a friend without the permission of the owner?
    • A. 

      Freeware

    • B. 

      Piracy

    • C. 

      Shareware

    • D. 

      Public domain

  • 47. 
    When a hard disk crashes, it is an example of a __________ type of computer security threat.
    • A. 

      Natural hazard

    • B. 

      Criminal

    • C. 

      Technological failure

    • D. 

      Civil strife

  • 48. 
    A common way to protect information being sent over a network, when long distance is involved, is
    • A. 

      Spying

    • B. 

      Setting up a firewall

    • C. 

      Passwording

    • D. 

      Encrypting

  • 49. 
    A __________ acts as a security buffer between a company’s private network and all external networks.
    • A. 

      Firewall

    • B. 

      Passwords

    • C. 

      Disaster recovery plan

    • D. 

      Virus checker

  • 50. 
    The study of fitting computers to people is called __________.
    • A. 

      Macro building

    • B. 

      Kinesthenics

    • C. 

      Ergonomics

    • D. 

      Chiropractic

  • 51. 
    ____ provide Internet access and have many members-only features that offer a variety of special content and services.
    • A. 

      ISPs

    • B. 

      LANs

    • C. 

      OSPs

    • D. 

      Networks

  • 52. 
    ___ provide wireless Internet access to users with wireless modems or Web-enabled handheld computers or devices.
    • A. 

      ISPs

    • B. 

      WSPs

    • C. 

      OSPs

    • D. 

      WANs

  • 53. 
    The domain name in the URL http://www.scsite.com/dc2003/ch2 is ____.
    • A. 

      Http://

    • B. 

      Www.scsite.com/

    • C. 

      Dc2002/

    • D. 

      Ch2

  • 54. 
    ____ program reads pages on Web sites in order to create an index of hits.
    • A. 

      Engine

    • B. 

      Directory

    • C. 

      Catalog

    • D. 

      Crawler

  • 55. 
    Web pages that list as the result of a search are called ____.
    • A. 

      Finds

    • B. 

      Spiders

    • C. 

      Hits

    • D. 

      Keywords

  • 56. 
    A built-in connection to another related Web page or part of a Web page is called a ____.
    • A. 

      Browser

    • B. 

      Hit

    • C. 

      Hyperlink

    • D. 

      Jump

  • 57. 
    When you want to transfer files between computers, the best Internet service to use is
    • A. 

      Instant Messaging

    • B. 

      FTP

    • C. 

      Chat

    • D. 

      Usenet

  • 58. 
    In networking, bandwidth refers to
    • A. 

      The speed at which a modem can operate

    • B. 

      The storage capacity of your email account

    • C. 

      The protocols used for Internet information

    • D. 

      The carrying capacity of the transmission media for sending information

  • 59. 
    If you want to connect your home computer so that you can view your school's website, in addition to your computer and modem you will need
    • A. 

      DSL, a browser, and the correct protocols

    • B. 

      An ISDN line, Windows, and an ISP

    • C. 

      Both an ISDN and DSL line and a browser.

    • D. 

      An ISP, browser, and your school's URL

  • 60. 
    Listservers are useful in helping teachers keep up with new ideas by:
    • A. 

      Allowing real-time, live chats between subscribers

    • B. 

      Listing new services on a community bulletin board

    • C. 

      Automatically sending information to your email box

    • D. 

      None of the above

  • 61. 
    What is the name for a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document?
    • A. 

      Spyware

    • B. 

      Virus

    • C. 

      Firewall

    • D. 

      Trojan Horse

  • 62. 
    What do you call a program used to detect unsolicited and unwanted e-mail and prevents those messages from getting to a user's inbox?
    • A. 

      Anti-spammer

    • B. 

      Email guard

    • C. 

      Virus filter

    • D. 

      Spam filter

  • 63. 
    What type of attack relies on the trusting nature of employees and the art of deception?
    • A. 

      Social Engineering

    • B. 

      Fraud

    • C. 

      Phishing

    • D. 

      Dumpster Driving

  • 64. 
    • A. 

      Viruses

    • B. 

      Unauthenticated interactive logins from the outside world

    • C. 

      Fire

    • D. 

      Connecting to and from the outside world

  • 65. 
    Which of the following is an example of a strong password?
    • A. 

      Password

    • B. 

      J*p2le04>F

    • C. 

      Your real name, user name, or company name

    • D. 

      Your birthdate

  • 66. 
    The majority of computer crimes are committed by:
    • A. 

      Hackers

    • B. 

      Insiders

    • C. 

      Overseas criminals

    • D. 

      Young teenage computer genius

  • 67. 
    The common name for the crime of stealing passwords is:
    • A. 

      Spooling

    • B. 

      Identity theft

    • C. 

      Spoofing

    • D. 

      Hacking

  • 68. 
    Collecting personal information and effectively posing as another individual is known as the crime of:
    • A. 

      Spooling

    • B. 

      Identity theft

    • C. 

      Spoofing

    • D. 

      Hacking

  • 69. 
    A program that performs a useful task while simultaneously allowing destructive acts is a:
    • A. 

      Worm

    • B. 

      Trojan Horse

    • C. 

      Virus

    • D. 

      Macro virus

  • 70. 
    An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:
    • A. 

      Trojan horse

    • B. 

      Virus

    • C. 

      Time-bomb

    • D. 

      Malware

  • 71. 
    What type of virus uses computer hosts to reproduce itself?
    • A. 

      Time bomb

    • B. 

      Worm

    • C. 

      Melissa Virus (I LOVE YOU VIRUS)

    • D. 

      Macro virus

  • 72. 
    What is the name of an application program that gathers user information and sends it to someone through the Internet?
    • A. 

      A Virus

    • B. 

      Spybot

    • C. 

      Logic Bomb

    • D. 

      Security patch

  • 73. 
    HTML viruses infect:
    • A. 

      Your computer

    • B. 

      A web page in HTML code

    • C. 

      Both a Web page and the computer that is viewing it

    • D. 

      None of the above

  • 74. 
    When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as:
    • A. 

      Viruses

    • B. 

      Trojan Horse

    • C. 

      Cracking

    • D. 

      A denial of service attack

  • 75. 
    ___ is the measurement of things such as fingerprints and retinal scans used for security access.
    • A. 

      Biometrics

    • B. 

      Biomeasurement

    • C. 

      Computer Security

    • D. 

      Smart weapon machinery

  • 76. 
    What is the most common tool used to restrict access to a computer system?
    • A. 

      User logins

    • B. 

      Passwords

    • C. 

      Computer keys

    • D. 

      Access-control Software

  • 77. 
    The most common passwords in the U.S. or Britain include all EXCEPT:
    • A. 

      Love

    • B. 

      Fred

    • C. 

      God

    • D. 

      123

  • 78. 
    The scrambling of code is known as:
    • A. 

      Encryption

    • B. 

      A firewall

    • C. 

      Scrambling

    • D. 

      Password-proofing

  • 79. 
    If you want to secure a message, use a(n):
    • A. 

      Cryptology source

    • B. 

      Encryption key

    • C. 

      Encryption software package

    • D. 

      Cryptosystem

  • 80. 
    _____ is defined as any crime completed through the use of computer technology.
    • A. 

      Computer forensics

    • B. 

      Computer Crimes

    • C. 

      Hacking

    • D. 

      Cracking

  • 81. 
    Most computer systems rely solely on ___________ for authentication.
    • A. 

      Logins

    • B. 

      Passwords

    • C. 

      Encryption

    • D. 

      Lock and key

  • 82. 
    Creating strong computer security to prevent computer crime usually simultaneously helps protect :
    • A. 

      Privacy rights

    • B. 

      Personal ethics

    • C. 

      The number of cookies downloaded to your personal computer

    • D. 

      Personal space

  • 83. 
    In the world of computing, the essential element that controls how computers are used is
    • A. 

      Ethics

    • B. 

      Legal laws

    • C. 

      Security requirements

    • D. 

      Business demands

  • 84. 
    The guidelines for the morally acceptable use of computers in society are
    • A. 

      Computer ethics

    • B. 

      Privacy

    • C. 

      Morality

    • D. 

      Legal systems

  • 85. 
    The issues that deal with the collection and use of data about individuals is
    • A. 

      Access

    • B. 

      Property

    • C. 

      Accuracy

    • D. 

      Privacy

  • 86. 
    The ethical issue concerned with the correctness of data collected is
    • A. 

      Access

    • B. 

      Property

    • C. 

      Exactness

    • D. 

      Privacy

  • 87. 
    The ethical issue that involves who is able to read and use data is
    • A. 

      Access

    • B. 

      Property

    • C. 

      Accuracy

    • D. 

      Privacy

  • 88. 
    Small files that are deposited on a user’s hard drive when they visit a Web site are best described as
    • A. 

      Cookies

    • B. 

      Codes

    • C. 

      Profiles

    • D. 

      Trackers

  • 89. 
    People who gain unauthorized access to computers for the fun of it, but do not intentionally do damage, are __________.
    • A. 

      Employees

    • B. 

      Hackers

    • C. 

      Crackers

    • D. 

      Members of organized crimes

  • 90. 
    A program that migrates through networks and operating systems and attaches itself to different programs and databases is a __________.
    • A. 

      Viruses

    • B. 

      Worms

    • C. 

      Denial-of-service attack

    • D. 

      Damage

  • 91. 
    A program that fills a computer system with self-replicating information thus clogging the system is called a __________.
    • A. 

      Viruses

    • B. 

      Worms

    • C. 

      Denial-of-service attack

    • D. 

      Damage

  • 92. 
    Which statement best describes a worm?
    • A. 

      A virus that is designed to destroy your hard drive

    • B. 

      A virus that is designed to frighten people about a nonexistent virus

    • C. 

      A virus that doesn’t attach itself to programs and databases

    • D. 

      A virus that is designed to shut down a server

  • 93. 
    Programs that come into a computer system disguised as something else are called
    • A. 

        spoofers

    • B. 

      Loggers

    • C. 

      Defacers

    • D. 

      Trojan Horse

  • 94. 
    An attempt to slow down or stop a computer system or network by flooding the system with requests for information is called a
    • A. 

      Viruses

    • B. 

      Worm

    • C. 

      Denial-of-service attack

    • D. 

      Trojan Horse

  • 95. 
    A fraudulent or deceptive act or operation designed to trick individuals into spending their time and money for little or no return is called a
    • A. 

      Annoyance

    • B. 

      Worm

    • C. 

      Attack

    • D. 

      Scam

  • 96. 
    • A. 

      Freeware

    • B. 

      Piracy

    • C. 

      Shareware

    • D. 

      Public domain

  • 97. 
    When a hard disk crashes, it is an example of a __________ type of computer security threat.
    • A. 

      Natural hazard

    • B. 

      Criminal

    • C. 

      Technological failure

    • D. 

      Civil strife

  • 98. 
    A common way to protect information being sent over a network, when long distance is involved, is
    • A. 

      Spying

    • B. 

      Setting up a firewall

    • C. 

      Passwording

    • D. 

      Encrypting

  • 99. 
    A __________ acts as a security buffer between a company’s private network and all external networks.
    • A. 

      Firewall

    • B. 

      Passwords

    • C. 

      Disaster recovery plan

    • D. 

      Virus checker

  • 100. 
    The study of fitting computers to people is called __________.
    • A. 

      Macro building

    • B. 

      Kinesthenics

    • C. 

      Ergonomics

    • D. 

      Chiropractic