Computers Memory Chapter 9 Quiz Questions

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Itswayneb
I
Itswayneb
Community Contributor
Quizzes Created: 1 | Total Attempts: 102
Questions: 23 | Attempts: 102

SettingsSettingsSettings
Computers Memory Chapter 9 Quiz Questions - Quiz

Lets Get It


Questions and Answers
  • 1. 

    Spyware programs that monitor keystrokes with the intent of stealing passwords, login IDs, or credit card information are referred to as ________.

    • A.

      Information recorders

    • B.

      Keystroke loggers

    • C.

      Spy loggers

    • D.

      Keystroke spies

    Correct Answer
    B. Keystroke loggers
    Explanation
    Keystroke loggers are spyware programs that monitor keystrokes with the intention of stealing sensitive information such as passwords, login IDs, or credit card details. They record every keystroke made on a computer, allowing the attacker to gather valuable data without the user's knowledge. These programs are designed to covertly collect personal information, making them a significant threat to online security and privacy.

    Rate this question:

  • 2. 

    A(n) ________ virus temporarily erases its code from the files where it resides and then hides in the computer's active memory.

    • A.

      Macro

    • B.

      E-mail

    • C.

      Stealth

    • D.

      Logic

    Correct Answer
    C. Stealth
    Explanation
    A stealth virus is a type of virus that temporarily removes its code from the files it infects and hides in the computer's active memory. This allows the virus to avoid detection by antivirus software and continue its malicious activities without being detected. Stealth viruses are designed to be highly elusive and difficult to detect, making them a significant threat to computer systems.

    Rate this question:

  • 3. 

    A ________ works independently of host file execution and is much more active in spreading itself than a virus is.

    • A.

      Execution timing

    • B.

      A milli sec

    • C.

      A bat

    • D.

      A worm

    Correct Answer
    D. A worm
    Explanation
    A worm is a type of malware that can replicate itself and spread across computer networks without requiring a host file to execute. Unlike a virus, which typically requires user interaction or the execution of a program to spread, a worm can actively propagate itself and infect other systems. This makes worms more aggressive and efficient in spreading compared to viruses, as they can quickly infect multiple devices and networks. Therefore, a worm is the correct answer because it fits the description of a malware that works independently of host file execution and is more active in spreading itself than a virus.

    Rate this question:

  • 4. 

    Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.

    • A.

      Logical port blocking

    • B.

      Static addressing.

    • C.

      Packet switching.

    • D.

      Packet filtering.

    Correct Answer
    A. Logical port blocking
    Explanation
    Logical port blocking refers to the process of configuring a firewall to ignore all incoming packets that request access to a specific port. This means that any packets attempting to access the specified port will be blocked and not allowed through the firewall. This is a security measure commonly used to protect against unauthorized access and potential threats from external sources.

    Rate this question:

  • 5. 

    All of the following approaches can be taken to protect your notebook computer from theft EXCEPT:

    • A.

      Attaching a motion alarm.

    • B.

      Installing software that can signal your notebook's location.

    • C.

      Installing an external hard drive.

    • D.

      Locking your notebook to a work surface.

    Correct Answer
    C. Installing an external hard drive.
    Explanation
    Installing an external hard drive does not directly protect the notebook computer from theft. It may provide additional storage space, but it does not have any security features to prevent or deter theft. The other options listed, such as attaching a motion alarm, installing location-tracking software, and locking the notebook to a work surface, are all security measures that can help protect the notebook from being stolen.

    Rate this question:

  • 6. 

    A(n) ________ is the portion of virus code that is unique to a particular computer virus.

    • A.

      Encryption code

    • B.

      Virus signature

    • C.

      Compression code

    • D.

      Virus pattern

    Correct Answer
    B. Virus signature
    Explanation
    A virus signature refers to the specific code or pattern that is unique to a particular computer virus. It is like a fingerprint that helps identify and differentiate one virus from another. Virus signatures are used by antivirus software to detect and remove viruses from infected systems. By comparing the code of a suspected file or program to a database of known virus signatures, antivirus programs can identify and quarantine or delete the virus.

    Rate this question:

  • 7. 

    Rules for creating passwords include all of the following EXCEPT:

    • A.

      Change your password frequently.

    • B.

      Create a hard-to-guess password, with a combination of letters, numbers, and symbols.

    • C.

      keep your password written down and stored in any easy-to-remember location.

    • D.

      Keep your password a secret.

    Correct Answer
    C. keep your password written down and stored in any easy-to-remember location.
    Explanation
    The given answer, "keep your password written down and stored in any easy-to-remember location," is incorrect because it goes against the rules for creating passwords. It is important to keep passwords confidential and not write them down or store them in easily accessible locations to prevent unauthorized access. The other options mentioned in the question, such as changing passwords frequently, creating complex passwords, and keeping passwords secret, are all valid rules for password security.

    Rate this question:

  • 8. 

    The most likely method a hacker would use to access a computer is ________.

    • A.

      Entering through its Internet connection

    • B.

      overhearing your password and log-on information

    • C.

      Sitting down at a computer and installing hacking software

    • D.

      Entering through a company intranet

    Correct Answer
    A. Entering through its Internet connection
    Explanation
    A hacker would most likely use the method of entering through a computer's Internet connection to gain unauthorized access. This is because the Internet connection is the primary gateway for communication between the computer and the outside world, making it a common target for hackers. By exploiting vulnerabilities in the network or using techniques such as phishing or malware, hackers can infiltrate the computer system and gain control or steal sensitive information.

    Rate this question:

  • 9. 

    A computer virus normally attaches itself to another computer program known as a ________.

    • A.

      Antivirus software

    • B.

      Host program

    • C.

      Hard drive

    • D.

      Files on the computer

    Correct Answer
    B. Host program
    Explanation
    A computer virus typically attaches itself to another computer program known as a host program. The host program serves as a carrier for the virus, allowing it to spread and replicate within the computer system. By attaching to the host program, the virus can execute its malicious code and potentially infect other files and programs on the computer. This method of attachment allows the virus to remain hidden and increases its chances of spreading undetected.

    Rate this question:

  • 10. 

    During the process of ________ the antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive.

    • A.

      Scanning

    • B.

      Inoculation

    • C.

      Quarantining

    • D.

      Encryption

    Correct Answer
    B. Inoculation
    Explanation
    During the process of inoculation, the antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive. This helps the antivirus software to identify and recognize any potential threats or malicious files in the future. By inoculating the files, the antivirus software creates a sort of immunity for your computer, making it more effective in detecting and protecting against viruses and other malware.

    Rate this question:

  • 11. 

    Devices that use a unique personal characteristic, such as a fingerprint, in place of a password are called ________ authentication devices.

    • A.

      Personal

    • B.

      Biological

    • C.

      Identity

    • D.

      Biometric

    Correct Answer
    D. Biometric
    Explanation
    Biometric authentication devices use a unique personal characteristic, such as a fingerprint, in place of a password. This type of authentication relies on the biological characteristics of an individual, such as fingerprints, iris patterns, or facial features, to verify their identity. Therefore, the correct term to describe these devices is "biometric authentication devices."

    Rate this question:

  • 12. 

    Many ________ sold for home use are also configured as firewalls and are capable of performing network address translation (NAT).

    • A.

      modems

    • B.

      Routers

    • C.

      Switches

    • D.

      Network interface cards (NICs)

    Correct Answer
    B. Routers
    Explanation
    Routers are devices that are commonly used for home networking purposes. They are capable of performing network address translation (NAT), which allows multiple devices in a home network to share a single internet connection. This feature also provides an added layer of security by acting as a firewall, protecting the network from unauthorized access. Therefore, routers are often configured as firewalls and are commonly sold for home use.

    Rate this question:

  • 13. 

    Which of these statements about physically protecting your computer is FALSE?

    • A.

      Old surge protectors can deliver power to your computer without protecting it.

    • B.

      Power surges can be blocked by using a computer surround.

    • C.

      Data line surges can be blocked by using a computer surround

    • D.

      It is best to unplug computers during an electrical storm.

    Correct Answer
    C. Data line surges can be blocked by using a computer surround
    Explanation
    Data line surges cannot be blocked by using a computer surround. A computer surround typically refers to a protective case or enclosure for a computer, which is designed to protect the computer from physical damage such as impact or dust. However, it does not provide any protection against data line surges, which are sudden spikes in electrical voltage that can occur on the data lines connected to the computer (such as Ethernet or USB cables). To protect against data line surges, additional measures such as using surge protectors or installing surge suppression devices on the data lines are required.

    Rate this question:

  • 14. 

    The purpose of network address translation (NAT) is to ________.

    • A.

      Convert logical ports to physical port configurations

    • B.

      hide user IP addresses from the Internet

    • C.

      Dynamically assign IP addresses via an ISP

    • D.

      Translate IP addresses from the Internet

    Correct Answer
    B. hide user IP addresses from the Internet
    Explanation
    NAT, or Network Address Translation, is used to hide user IP addresses from the Internet. It allows multiple devices within a private network to share a single public IP address, which enhances security and conserves IP addresses. By translating the private IP addresses of the devices into a single public IP address, NAT ensures that the individual IP addresses of the devices are not exposed to the Internet, providing an additional layer of privacy and protection.

    Rate this question:

  • 15. 

    A cyberspace ________ is an attempt to make someone believe something that is untrue.

    • A.

      Prank

    • B.

      Joke

    • C.

      Legend

    • D.

      Hoax

    Correct Answer
    D. Hoax
    Explanation
    A cyberspace hoax refers to a deliberate attempt to deceive someone by making them believe something that is false. It involves spreading false information or creating fake stories with the intention of tricking people into believing them. Unlike a prank or joke, which may be intended for amusement, a hoax is designed to mislead and deceive others. A legend, on the other hand, typically refers to a traditional story or myth, which may or may not be true.

    Rate this question:

  • 16. 

    Which type of virus was the famous Michelangelo virus?

    • A.

      A worm

    • B.

      A time bomb

    • C.

      A script virus

    • D.

      An e-mail virus

    Correct Answer
    B. A time bomb
    Explanation
    The Michelangelo virus was a type of time bomb virus. A time bomb virus is a malicious program that remains dormant on a computer until a specific date or trigger event occurs. In the case of the Michelangelo virus, it was programmed to activate on March 6th, which is the birthday of the famous Italian artist Michelangelo. Once activated, the virus would overwrite the first 100 sectors of the hard drive, rendering the computer inoperable. This type of virus gained significant media attention in the early 1990s due to its potential to cause widespread damage.

    Rate this question:

  • 17. 

    Which of the following is a program that appears to be something useful or desirable but does something malicious in the background?

    • A.

      a Trojan horse

    • B.

      A virus

    • C.

      A worm

    • D.

      A zombie

    Correct Answer
    A. a Trojan horse
    Explanation
    A Trojan horse is a program that appears to be something useful or desirable but actually carries out malicious activities in the background. It tricks the user into thinking that it is harmless or beneficial, but once it is executed, it can perform actions such as stealing personal information, damaging files, or giving unauthorized access to the attacker. Unlike viruses and worms, Trojan horses do not self-replicate or spread on their own.

    Rate this question:

  • 18. 

    Which of the following classifications of viruses can change its own code to avoid detection?

    • A.

      Stealth

    • B.

      Multipartite

    • C.

      Polymorphic

    • D.

      Worm

    Correct Answer
    C. Polymorphic
    Explanation
    Polymorphic viruses are able to change their own code to avoid detection. This means that each time the virus replicates itself, it alters its own code, making it difficult for antivirus software to recognize and detect the virus. By constantly changing its code, the polymorphic virus can evade detection and continue to infect systems without being detected by security measures.

    Rate this question:

  • 19. 

    A ________ is a virus that is attached to documents such as Word or Excel files.

    • A.

      Script virus

    • B.

      Macro virus

    • C.

      Polymorphic virus

    • D.

      Worm

    Correct Answer
    B. Macro virus
    Explanation
    A macro virus is a type of virus that infects documents, such as Word or Excel files, by attaching itself to the macros within these files. Macros are sets of instructions or commands that automate tasks within these documents. When a document containing a macro virus is opened, the virus is executed and can spread to other documents or perform malicious actions, such as deleting files or stealing information. Therefore, a macro virus is the correct answer as it specifically targets and infects documents with macros.

    Rate this question:

  • 20. 

    Using a ________, hackers can access and delete all files on your computer, send e-mail, run programs, and do just about anything else you can do with your computer.

    • A.

      Trojan horse

    • B.

      Packet sniffer

    • C.

      Backdoor program

    • D.

      DDoS

    Correct Answer
    C. Backdoor program
    Explanation
    A backdoor program is a type of malicious software that allows hackers to gain unauthorized access to a computer system. Once installed, it provides a secret entry point that bypasses normal authentication procedures, giving the hacker full control over the system. This means they can access and delete files, send emails, run programs, and perform any other actions that the computer owner can do. In essence, a backdoor program grants hackers unrestricted access to a compromised computer, enabling them to carry out various malicious activities undetected.

    Rate this question:

  • 21. 

    Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.

    • A.

      Engineering

    • B.

      Theft

    • C.

      Pretexting

    • D.

      Pharming

    Correct Answer
    A. Engineering
    Explanation
    Social engineering is a technique that manipulates human behavior to gain access to sensitive information. It involves using social skills to deceive or manipulate individuals into revealing confidential information. This can be done through various methods such as impersonation, pretexting, or manipulation tactics. The term "engineering" in this context refers to the act of manipulating or engineering human interactions to achieve the desired outcome of obtaining sensitive information.

    Rate this question:

  • 22. 

    You can block logical ports to invaders and make your computer invisible to others on the Internet by installing ________.

    • A.

      Firewall

    • B.

      Packet filter

    • C.

      A packet sniffer

    • D.

      Antivirus filter

    Correct Answer
    A. Firewall
    Explanation
    A firewall is a security device or software that monitors and controls incoming and outgoing network traffic based on predetermined security rules. By installing a firewall, you can block logical ports to invaders and prevent unauthorized access to your computer from the internet. This makes your computer invisible to others and helps protect it from potential threats and attacks. A packet filter, packet sniffer, and antivirus filter do not provide the same level of protection as a firewall.

    Rate this question:

  • 23. 

    A ________ is a virus that is triggered when certain conditions are met, such as a file opening or starting a program a certain number of times.

    • A.

      Boot-sector virus

    • B.

      Time bomb

    • C.

      Logic bomb

    • D.

      Trojan horse

    Correct Answer
    C. Logic bomb
    Explanation
    A logic bomb is a type of virus that remains dormant until specific conditions are met, such as a file opening or a program being started a certain number of times. Once these conditions are met, the logic bomb is triggered and executes its malicious payload. Unlike other types of viruses, logic bombs are designed to be hidden and undetectable until their activation criteria are fulfilled. They are often used to cause damage or disruption to a computer system or network.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 16, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 01, 2012
    Quiz Created by
    Itswayneb
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.