Computers Memory Chapter 9 Quiz Questions

23 Questions | Total Attempts: 65

SettingsSettingsSettings
Please wait...
Computers Memory Chapter 9 Quiz Questions

Lets Get It


Questions and Answers
  • 1. 
    Spyware programs that monitor keystrokes with the intent of stealing passwords, login IDs, or credit card information are referred to as ________.
    • A. 

      Information recorders

    • B. 

      Keystroke loggers

    • C. 

      Spy loggers

    • D. 

      Keystroke spies

  • 2. 
    A(n) ________ virus temporarily erases its code from the files where it resides and then hides in the computer's active memory.
    • A. 

      Macro

    • B. 

      E-mail

    • C. 

      Stealth

    • D. 

      Logic

  • 3. 
    A ________ works independently of host file execution and is much more active in spreading itself than a virus is.
    • A. 

      Execution timing

    • B. 

      A milli sec

    • C. 

      A bat

    • D. 

      A worm

  • 4. 
    Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.
    • A. 

      Logical port blocking

    • B. 

      Static addressing.

    • C. 

      Packet switching.

    • D. 

      Packet filtering.

  • 5. 
    All of the following approaches can be taken to protect your notebook computer from theft EXCEPT:
    • A. 

      Attaching a motion alarm.

    • B. 

      Installing software that can signal your notebook's location.

    • C. 

      Installing an external hard drive.

    • D. 

      Locking your notebook to a work surface.

  • 6. 
    A(n) ________ is the portion of virus code that is unique to a particular computer virus.
    • A. 

      Encryption code

    • B. 

      Virus signature

    • C. 

      Compression code

    • D. 

      Virus pattern

  • 7. 
    Rules for creating passwords include all of the following EXCEPT:
    • A. 

      Change your password frequently.

    • B. 

      Create a hard-to-guess password, with a combination of letters, numbers, and symbols.

    • C. 

      keep your password written down and stored in any easy-to-remember location.

    • D. 

      Keep your password a secret.

  • 8. 
    The most likely method a hacker would use to access a computer is ________.
    • A. 

      Entering through its Internet connection

    • B. 

      overhearing your password and log-on information

    • C. 

      Sitting down at a computer and installing hacking software

    • D. 

      Entering through a company intranet

  • 9. 
    A computer virus normally attaches itself to another computer program known as a ________.
    • A. 

      Antivirus software

    • B. 

      Host program

    • C. 

      Hard drive

    • D. 

      Files on the computer

  • 10. 
    During the process of ________ the antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive.
    • A. 

      Scanning

    • B. 

      Inoculation

    • C. 

      Quarantining

    • D. 

      Encryption

  • 11. 
    Devices that use a unique personal characteristic, such as a fingerprint, in place of a password are called ________ authentication devices.
    • A. 

      Personal

    • B. 

      Biological

    • C. 

      Identity

    • D. 

      Biometric

  • 12. 
    Many ________ sold for home use are also configured as firewalls and are capable of performing network address translation (NAT).
    • A. 

      modems

    • B. 

      Routers

    • C. 

      Switches

    • D. 

      Network interface cards (NICs)

  • 13. 
    Which of these statements about physically protecting your computer is FALSE?
    • A. 

      Old surge protectors can deliver power to your computer without protecting it.

    • B. 

      Power surges can be blocked by using a computer surround.

    • C. 

      Data line surges can be blocked by using a computer surround

    • D. 

      It is best to unplug computers during an electrical storm.

  • 14. 
    The purpose of network address translation (NAT) is to ________.
    • A. 

      Convert logical ports to physical port configurations

    • B. 

      hide user IP addresses from the Internet

    • C. 

      Dynamically assign IP addresses via an ISP

    • D. 

      Translate IP addresses from the Internet

  • 15. 
    A cyberspace ________ is an attempt to make someone believe something that is untrue.
    • A. 

      Prank

    • B. 

      Joke

    • C. 

      Legend

    • D. 

      Hoax

  • 16. 
    Which type of virus was the famous Michelangelo virus?
    • A. 

      A worm

    • B. 

      A time bomb

    • C. 

      A script virus

    • D. 

      An e-mail virus

  • 17. 
    Which of the following is a program that appears to be something useful or desirable but does something malicious in the background?
    • A. 

      a Trojan horse

    • B. 

      A virus

    • C. 

      A worm

    • D. 

      A zombie

  • 18. 
    Which of the following classifications of viruses can change its own code to avoid detection?
    • A. 

      Stealth

    • B. 

      Multipartite

    • C. 

      Polymorphic

    • D. 

      Worm

  • 19. 
    A ________ is a virus that is attached to documents such as Word or Excel files.
    • A. 

      Script virus

    • B. 

      Macro virus

    • C. 

      Polymorphic virus

    • D. 

      Worm

  • 20. 
    Using a ________, hackers can access and delete all files on your computer, send e-mail, run programs, and do just about anything else you can do with your computer.
    • A. 

      Trojan horse

    • B. 

      Packet sniffer

    • C. 

      Backdoor program

    • D. 

      DDoS

  • 21. 
    Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
    • A. 

      Engineering

    • B. 

      Theft

    • C. 

      Pretexting

    • D. 

      Pharming

  • 22. 
    You can block logical ports to invaders and make your computer invisible to others on the Internet by installing ________.
    • A. 

      Firewall

    • B. 

      Packet filter

    • C. 

      A packet sniffer

    • D. 

      Antivirus filter

  • 23. 
    A ________ is a virus that is triggered when certain conditions are met, such as a file opening or starting a program a certain number of times.
    • A. 

      Boot-sector virus

    • B. 

      Time bomb

    • C. 

      Logic bomb

    • D. 

      Trojan horse

Back to Top Back to top