Final Exam - It101

55 Questions | Total Attempts: 158

SettingsSettingsSettings
Computer Hardware Quizzes & Trivia

The final exam for IT 101


Questions and Answers
  • 1. 
    ___________ is the first step in good computer security.
    • A. 

      Awareness

    • B. 

      Threat

    • C. 

      Security

  • 2. 
    ______________ is anything that can cause harm to our compupter resources.
    • A. 

      Identity theft

    • B. 

      Threat

    • C. 

      Snagging

    • D. 

      Social Engineering

  • 3. 
    _________ is defined as a step to ward off threat, thus protecting our data from harm.
    • A. 

      Indentity theft

    • B. 

      Countermeasure

    • C. 

      Snagging

    • D. 

      Social engineering

  • 4. 
    _______ is a technology term used when someone impersonates you.
    • A. 

      Identify theft

    • B. 

      Countermeasure

    • C. 

      Snagging

    • D. 

      Social engineering

  • 5. 
    ____________ is watching someone who withdraws on the ATM machine, and getting to know his or her PIN number.
    • A. 

      Shoulder watching

    • B. 

      Snatching

    • C. 

      Shoulder surfing

    • D. 

      Threatening

  • 6. 
    The use of wire tapping so that one can listen to any conversation over a telephone line is called __________.
    • A. 

      Shoulder snapping

    • B. 

      Snagging

    • C. 

      Social engineering

  • 7. 
    _____________ is a tecnique used by thefts to unsuspecting victim in providing critical information under the pretext of something legitimate such as pretending to be the one who is in authorty.
    • A. 

      Shoulder snapping

    • B. 

      Snagging

    • C. 

      Social engineering

  • 8. 
    A person who is running a bogus website pretending to be a hiring manager of a well known company.  He tricks website visitors he can help them have a job for the company with the condition that he deposits money for processing.  What technique is the person using?
    • A. 

      Social engineering

    • B. 

      Snagging

    • C. 

      Shoulder surfing

  • 9. 
    The famous "Hello Garci Tapes", which a conversation between the President and a COMELEC official was recorded, was an example of ___________.
    • A. 

      Snagging

    • B. 

      Social engineering

    • C. 

      Shoulder surfing

  • 10. 
    A technique where a person can go to the garbage cans or trash bins to get cancelled checks, bank deposit slips or credit card statements is referred to as _________.
    • A. 

      Shoulder surfing

    • B. 

      Identity theft

    • C. 

      Dumpster diving

  • 11. 
    ____________ is a program that works like a biological virus that spread from one computer through another with damaging effects.
    • A. 

      Computer virus

    • B. 

      Computer software

    • C. 

      Malware

  • 12. 
    A software that is used to scan and destroy computer virus is called _____________.
    • A. 

      Antivirus

    • B. 

      Antitheft

    • C. 

      Antibiotic

  • 13. 
    Check more that one choices to answer the question. Which of the following devices where computer virus can spread?
    • A. 

      Flasdrive

    • B. 

      Network

    • C. 

      Diskette

    • D. 

      Air

  • 14. 
    To avoid the spread of viruses, which of the following should be best applied when inserting a USB flash disk?
    • A. 

      Scan the flashdisk before accessing the files

    • B. 

      Move the files the computer then scan

    • C. 

      Copy the files to the computer then scan

  • 15. 
    Which statement is true in the following when using antivirus?
    • A. 

      Antivirus software should be manually activated to detect viruses.

    • B. 

      Antivirus software can detect all types of viruses.

    • C. 

      Antivirus software should be continually updated to detect new

  • 16. 
    A ______ is a program that performs a useful task, however it carries out some secret destructive motive and cruel intention.
    • A. 

      Trojan

    • B. 

      Worms

    • C. 

      Logic bomb

  • 17. 
    A _____________ resides in the computers memory that can travel indepently over computer networks.
    • A. 

      Trojan

    • B. 

      Logic bomb

    • C. 

      Worms

  • 18. 
    ___________ are trigerred to perform a task or a mission when it encounters som events such as a date came or a simple mouse click or opening of storage devices, or a certain amount of time elpased.
    • A. 

      Worms

    • B. 

      Trojan

    • C. 

      Logic bomb

  • 19. 
    Can a cookie be used as a spying tool?
    • A. 

      True

    • B. 

      False

  • 20. 
    _________ is a small code that a web server asks the web browser to place on the computer.
    • A. 

      Cookies

    • B. 

      Spyware

    • C. 

      Spam

  • 21. 
    _________ is like a cookie that can track a computer users activities and report them to someone else.
    • A. 

      Spam

    • B. 

      Cookies

    • C. 

      Spyware

  • 22. 
    __________ are classified as unwanted emails entering in your inbox.
    • A. 

      Spam

    • B. 

      Spyware

    • C. 

      Cookies

  • 23. 
    Any act of stealing hardware ad software resources are classified as _________.
    • A. 

      Hacking

    • B. 

      Cybercrime

    • C. 

      Cyberterrorism

  • 24. 
    _________ is an illegal act of accessing the computer resources of some people without the knowledge or permission, or unauthorized access into company's network system.
    • A. 

      Hacking

    • B. 

      Cybercrime

    • C. 

      Cyberterrorism

  • 25. 
    A hacker employs __________ technique where he tries to guess the password of the hapless victim.
    • A. 

      Sniffing

    • B. 

      Crawling

    • C. 

      Guessing

Back to Top Back to top