1.
Spyware programs that monitor keystrokes with the intent of stealing passwords, login IDs, or credit card information are referred to as ________.
A. 
B. 
C. 
D. 
2.
A(n) ________ virus temporarily erases its code from the files where it resides and then hides in the computer's active memory.
A. 
B. 
C. 
D. 
3.
A ________ works independently of host file execution and is much more active in spreading itself than a virus is.
A. 
B. 
C. 
D. 
4.
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.
A. 
B. 
C. 
D. 
5.
All of the following approaches can be taken to protect your notebook computer from theft EXCEPT:
A. 
Attaching a motion alarm.
B. 
Installing software that can signal your notebook's location.
C. 
Installing an external hard drive.
D. 
Locking your notebook to a work surface.
6.
A(n) ________ is the portion of virus code that is unique to a particular computer virus.
A. 
B. 
C. 
D. 
7.
Rules for creating passwords include all of the following EXCEPT:
A. 
Change your password frequently.
B. 
Create a hard-to-guess password, with a combination of letters, numbers, and symbols.
C. 
keep your password written down and stored in any easy-to-remember location.
D. 
Keep your password a secret.
8.
The most likely method a hacker would use to access a computer is ________.
A. 
Entering through its Internet connection
B. 
overhearing your password and log-on information
C. 
Sitting down at a computer and installing hacking software
D. 
Entering through a company intranet
9.
A computer virus normally attaches itself to another computer program known as a ________.
A. 
B. 
C. 
D. 
10.
During the process of ________ the antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive.
A. 
B. 
C. 
D. 
11.
Devices that use a unique personal characteristic, such as a fingerprint, in place of a password are called ________ authentication devices.
A. 
B. 
C. 
D. 
12.
Many ________ sold for home use are also configured as firewalls and are capable of performing network address translation (NAT).
A. 
B. 
C. 
D. 
Network interface cards (NICs)
13.
Which of these statements about physically protecting your computer is FALSE?
A. 
Old surge protectors can deliver power to your computer without protecting it.
B. 
Power surges can be blocked by using a computer surround.
C. 
Data line surges can be blocked by using a computer surround
D. 
It is best to unplug computers during an electrical storm.
14.
The purpose of network address translation (NAT) is to ________.
A. 
Convert logical ports to physical port configurations
B. 
hide user IP addresses from the Internet
C. 
Dynamically assign IP addresses via an ISP
D. 
Translate IP addresses from the Internet
15.
A cyberspace ________ is an attempt to make someone believe something that is untrue.
A. 
B. 
C. 
D. 
16.
Which type of virus was the famous Michelangelo virus?
A. 
B. 
C. 
D. 
17.
Which of the following is a program that appears to be something useful or desirable but does something malicious in the background?
A. 
B. 
C. 
D. 
18.
Which of the following classifications of viruses can change its own code to avoid detection?
A. 
B. 
C. 
D. 
19.
A ________ is a virus that is attached to documents such as Word or Excel files.
A. 
B. 
C. 
D. 
20.
Using a ________, hackers can access and delete all files on your computer, send e-mail, run programs, and do just about anything else you can do with your computer.
A. 
B. 
C. 
D. 
21.
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
A. 
B. 
C. 
D. 
22.
You can block logical ports to invaders and make your computer invisible to others on the Internet by installing ________.
A. 
B. 
C. 
D. 
23.
A ________ is a virus that is triggered when certain conditions are met, such as a file opening or starting a program a certain number of times.
A. 
B. 
C. 
D.