Toughest Computer Networking: Quiz!

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Jscansino
J
Jscansino
Community Contributor
Quizzes Created: 2 | Total Attempts: 552
| Attempts: 447
SettingsSettings
Please wait...
  • 1/100 Questions

    The domain name in the URL http://www.scsite.com/dc2003/ch2 is ____.

    • Http://
    • Www.scsite.com/
    • Dc2002/
    • Ch2
Please wait...
About This Quiz

Tackle the 'Toughest Computer Networking: Quiz!' to master various aspects of internet technologies. Test your knowledge on OSPs, WSPs, domain names, web directories, search keywords, and hyperlinks. Perfect for learners aiming to deepen their understanding of web networking.

Toughest Computer Networking: Quiz! - Quiz

Quiz Preview

  • 2. 

    When you want to transfer files between computers, the best Internet service to use is

    • Instant Messaging

    • FTP

    • Chat

    • Usenet

    Correct Answer
    A. FTP
    Explanation
    FTP (File Transfer Protocol) is the best internet service to use when you want to transfer files between computers. It is specifically designed for file transfer and allows for efficient and secure transfer of large files over the internet. Instant Messaging, Chat, and Usenet are not specifically designed for file transfer and may not provide the same level of efficiency and security as FTP. Therefore, FTP is the most suitable option for transferring files between computers.

    Rate this question:

  • 3. 

    If you want to connect your home computer so that you can view your school's website, in addition to your computer and modem you will need

    • DSL, a browser, and the correct protocols

    • An ISDN line, Windows, and an ISP

    • Both an ISDN and DSL line and a browser.

    • An ISP, browser, and your school's URL

    Correct Answer
    A. DSL, a browser, and the correct protocols
    Explanation
    To connect your home computer and view your school's website, you will need DSL, a browser, and the correct protocols. DSL (Digital Subscriber Line) is a type of high-speed internet connection that allows you to access websites. A browser is a software application that enables you to navigate and view web pages. Additionally, the correct protocols are necessary to establish a connection between your computer and the school's website. These protocols ensure that data is transmitted and received correctly over the internet.

    Rate this question:

  • 4. 

    What do you call a program used to detect unsolicited and unwanted e-mail and prevents those messages from getting to a user's inbox?

    • Anti-spammer

    • Email guard

    • Virus filter

    • Spam filter

    Correct Answer
    A. Anti-spammer
    Explanation
    An anti-spammer is a program used to detect unsolicited and unwanted e-mail and prevent those messages from getting to a user's inbox. It is specifically designed to identify and block spam emails, which are often sent in bulk and can be harmful or annoying to recipients. This program helps to ensure that users only receive legitimate and desired emails in their inbox, enhancing their online experience and protecting them from potential security threats.

    Rate this question:

  • 5. 

    What type of attack relies on the trusting nature of employees and the art of deception?

    • Social Engineering

    • Fraud

    • Phishing

    • Dumpster Driving

    Correct Answer
    A. Social Engineering
    Explanation
    Social Engineering is the correct answer because it involves exploiting the trusting nature of employees and using deception to manipulate them into revealing sensitive information or performing actions that could compromise security. This type of attack often involves techniques such as impersonation, phishing, or pretexting to trick individuals into divulging confidential information or granting unauthorized access to systems.

    Rate this question:

  • 6. 

    Small files that are deposited on a user’s hard drive when they visit a Web site are best described as

    • Cookies

    • Codes

    • Profiles

    • Trackers

    Correct Answer
    A. Cookies
    Explanation
    Small files that are deposited on a user's hard drive when they visit a website are commonly known as cookies. Cookies are used to store information about the user's browsing activity and preferences, allowing websites to personalize the user experience and remember certain settings. They are widely used by websites for various purposes such as tracking user behavior, remembering login information, and delivering targeted advertisements. Therefore, the correct answer is cookies.

    Rate this question:

  • 7. 

    Which of the following is an example of a strong password?

    • Password

    • J*p2le04>F

    • Your real name, user name, or company name

    • Your birthdate

    Correct Answer
    A. J*p2le04>F
    Explanation
    The given password "J*p2le04>F" is an example of a strong password because it includes a combination of uppercase and lowercase letters, numbers, and special characters. This makes it more difficult for hackers to guess or crack the password using brute force or dictionary attacks. Additionally, the password is long enough, which further enhances its strength.

    Rate this question:

  • 8. 

    Creating strong computer security to prevent computer crime usually simultaneously helps protect :

    • Privacy rights

    • Personal ethics

    • The number of cookies downloaded to your personal computer

    • Personal space

    Correct Answer
    A. Privacy rights
    Explanation
    Creating strong computer security measures such as encryption, firewalls, and secure authentication protocols helps to prevent unauthorized access to personal information, ensuring privacy rights are protected. By implementing robust security measures, individuals can safeguard their personal data from being accessed or misused by hackers or cybercriminals. This helps to maintain the confidentiality and integrity of sensitive information, preserving privacy rights.

    Rate this question:

  • 9. 

    The guidelines for the morally acceptable use of computers in society are

    • Computer ethics

    • Privacy

    • Morality

    • Legal systems

    Correct Answer
    A. Computer ethics
    Explanation
    Computer ethics refers to the moral principles and guidelines that govern the appropriate use of computers in society. It involves understanding and applying ethical standards to issues such as privacy, security, intellectual property, and the impact of technology on individuals and society as a whole. Computer ethics helps to ensure that computers are used in a responsible and ethical manner, taking into consideration the potential consequences and implications of their use. It encompasses both legal and moral considerations, making it an important aspect of the ethical use of computers in society.

    Rate this question:

  • 10. 

    ___ provide wireless Internet access to users with wireless modems or Web-enabled handheld computers or devices.

    • ISPs

    • WSPs

    • OSPs

    • WANs

    Correct Answer
    A. WSPs
    Explanation
    WSPs, or Wireless Service Providers, provide wireless Internet access to users with wireless modems or Web-enabled handheld computers or devices. They offer connectivity through wireless networks, allowing users to access the internet without the need for wired connections. ISPs, or Internet Service Providers, generally provide internet access through wired connections, while OSPs, or Online Service Providers, offer various online services but may not necessarily provide wireless internet access. WANs, or Wide Area Networks, are a type of network that connects multiple locations and can be used to provide internet access, but they are not specifically focused on wireless connectivity.

    Rate this question:

  • 11. 

    What can a firewall protect against?

    • Viruses

    • Unauthenticated interactive logins from the outside world

    • Fire

    • Connecting to and from the outside world

    Correct Answer
    A. Unauthenticated interactive logins from the outside world
    Explanation
    A firewall can protect against unauthenticated interactive logins from the outside world. This means that it can prevent unauthorized access to a network or system by blocking login attempts from unknown or unverified sources. By enforcing authentication measures, such as requiring valid credentials or using secure protocols, a firewall can help ensure that only authorized users are able to access a network or system remotely. This helps to enhance security and protect against potential breaches or unauthorized access attempts.

    Rate this question:

  • 12. 

    Collecting personal information and effectively posing as another individual is known as the crime of:

    • Spooling

    • Identity theft

    • Spoofing

    • Hacking

    Correct Answer
    A. Identity theft
    Explanation
    Identity theft is the correct answer because it involves the act of collecting personal information and impersonating another individual. This crime typically involves stealing someone's personal details, such as their social security number, credit card information, or other identifying information, with the intent to commit fraud or other illegal activities. The thief may use this stolen information to make unauthorized purchases, open fraudulent accounts, or even commit crimes in the victim's name. Identity theft is a serious offense that can cause significant financial and emotional harm to the victims.

    Rate this question:

  • 13. 

    An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:

    • Trojan horse

    • Virus

    • Time-bomb

    • Malware

    Correct Answer
    A. Virus
    Explanation
    A virus is a type of malicious software that is designed to replicate itself and spread from one program or disk to another. Unlike other types of malware, such as Trojan horses or time-bombs, viruses have the ability to self-replicate and infect other files or systems without the user's knowledge or consent. They can cause damage to computer systems, steal personal information, or disrupt normal operations. Therefore, the correct answer for the given question is "Virus".

    Rate this question:

  • 14. 

    The ethical issue concerned with the correctness of data collected is

    • Access

    • Property

    • Exactness

    • Privacy

    Correct Answer
    A. Exactness
    Explanation
    The ethical issue concerned with the correctness of data collected is "exactness". This means that collecting accurate and precise data is crucial from an ethical standpoint. It is important to ensure that the data collected is free from errors, biases, or any form of manipulation. This is essential to maintain the integrity and reliability of the data, as well as to ensure that any decisions or actions based on that data are fair and just. Failing to prioritize exactness in data collection can lead to misinformation, misinterpretation, and potential harm to individuals or organizations relying on that data.

    Rate this question:

  • 15. 

    In networking, bandwidth refers to

    • The speed at which a modem can operate

    • The storage capacity of your email account

    • The protocols used for Internet information

    • The carrying capacity of the transmission media for sending information

    Correct Answer
    A. The carrying capacity of the transmission media for sending information
    Explanation
    Bandwidth in networking refers to the carrying capacity of the transmission media for sending information. It represents the maximum amount of data that can be transmitted over a network connection in a given amount of time. It is often measured in bits per second (bps) and determines the speed at which data can be transferred between devices on a network. A higher bandwidth allows for faster and more efficient data transmission, while a lower bandwidth can result in slower network speeds and decreased performance.

    Rate this question:

  • 16. 

    HTML viruses infect:

    • Your computer

    • A web page in HTML code

    • Both a Web page and the computer that is viewing it

    • None of the above

    Correct Answer
    A. A web page in HTML code
    Explanation
    HTML viruses infect a web page in HTML code. HTML (Hypertext Markup Language) is the standard language used to create web pages. Viruses that target HTML code can infect and manipulate the content of a web page, potentially causing harm to the visitors who view that page. These viruses can exploit vulnerabilities in the HTML code or inject malicious scripts, leading to various security risks and compromising the integrity of the web page.

    Rate this question:

  • 17. 

    What is the most common tool used to restrict access to a computer system?

    • User logins

    • Passwords

    • Computer keys

    • Access-control Software

    Correct Answer
    A. Passwords
    Explanation
    Passwords are the most common tool used to restrict access to a computer system. They provide a level of security by requiring users to enter a unique combination of characters that only they should know. Passwords act as a barrier, preventing unauthorized individuals from gaining access to sensitive information or performing unauthorized actions on the system. By setting strong and unique passwords, users can protect their accounts and ensure that only authorized individuals can access the computer system.

    Rate this question:

  • 18. 

    When you want to transfer files between computers, the best Internet service to use is

    • Instant Messaging

    • FTP

    • Chat

    • Usenet

    Correct Answer
    A. FTP
    Explanation
    FTP (File Transfer Protocol) is the best Internet service to use when transferring files between computers. FTP is specifically designed for file transfer and allows users to easily upload, download, and manage files on remote servers. Unlike instant messaging, chat, or Usenet, FTP is dedicated solely to file transfer and offers more reliable and efficient transfer speeds. Therefore, FTP is the most suitable and effective option for transferring files between computers over the Internet.

    Rate this question:

  • 19. 

    Which of the following is an example of a strong password?

    • Password

    • J*p2le04>F

    • Your real name, user name, or company name

    • Your birthdate

    Correct Answer
    A. J*p2le04>F
    Explanation
    The password "J*p2le04>F" is an example of a strong password because it includes a combination of uppercase and lowercase letters, numbers, and special characters. This makes it more difficult for hackers to guess or crack the password through brute force or dictionary attacks. Additionally, the password is sufficiently long, which further enhances its strength.

    Rate this question:

  • 20. 

    The most common passwords in the U.S. or Britain include all EXCEPT:

    • Love

    • Fred

    • God

    • 123

    Correct Answer
    A. 123
    Explanation
    The given answer, 123, is the most common password used by people in the U.S. or Britain. This password is extremely weak and easily guessable, as it consists of consecutive numbers. It is recommended to use stronger and more unique passwords to ensure the security of personal information and online accounts.

    Rate this question:

  • 21. 

    A fraudulent or deceptive act or operation designed to trick individuals into spending their time and money for little or no return is called a

    • Annoyance

    • Worm

    • Attack

    • Scam

    Correct Answer
    A. Scam
    Explanation
    A fraudulent or deceptive act or operation designed to trick individuals into spending their time and money for little or no return is called a scam. Scams are typically carried out by individuals or organizations with the intention of defrauding or tricking people into giving away their personal information, money, or resources. Scammers often use various tactics such as false promises, fake identities, or misleading information to deceive their victims. It is important to be cautious and aware of potential scams to protect oneself from falling victim to these fraudulent activities.

    Rate this question:

  • 22. 

    A __________ acts as a security buffer between a company’s private network and all external networks.

    • Firewall

    • Passwords

    • Disaster recovery plan

    • Virus checker

    Correct Answer
    A. Firewall
    Explanation
    A firewall acts as a security buffer between a company's private network and all external networks. It monitors and controls incoming and outgoing network traffic based on predetermined security rules. It helps to prevent unauthorized access, protects against malicious attacks, and filters out potentially harmful data packets. By enforcing network security policies, a firewall acts as the first line of defense in protecting the company's private network from external threats.

    Rate this question:

  • 23. 

    Which of the following would best fit the following description – software is copied and given to a friend without the permission of the owner?

    • Freeware

    • Piracy

    • Shareware

    • Public domain

    Correct Answer
    A. Piracy
    Explanation
    Piracy is the act of illegally copying and distributing software without the permission of the owner. This involves making unauthorized copies of software and sharing them with others, which is a violation of copyright laws. Freeware refers to software that is available for free, shareware refers to software that can be downloaded and used for a trial period before purchasing, and public domain refers to software that is not protected by copyright and can be freely used and distributed. Therefore, piracy is the most appropriate term to describe the act of copying and distributing software without permission.

    Rate this question:

  • 24. 

    Web pages that list as the result of a search are called ____.

    • Finds

    • Spiders

    • Hits

    • Keywords

    Correct Answer
    A. Keywords
    Explanation
    When conducting a search on a search engine, the user inputs specific words or phrases that are relevant to their desired information. These words or phrases are known as keywords. The search engine then uses these keywords to generate a list of web pages that are most relevant to the search query. Therefore, the correct answer is "keywords".

    Rate this question:

  • 25. 

    A built-in connection to another related Web page or part of a Web page is called a ____.

    • Browser

    • Hit

    • Hyperlink

    • Jump

    Correct Answer
    A. Hyperlink
    Explanation
    A built-in connection to another related Web page or part of a Web page is called a hyperlink. Hyperlinks allow users to navigate between different web pages or sections within a webpage by simply clicking on them. They are commonly used in websites to provide easy access to additional information or related content.

    Rate this question:

  • 26. 

    What type of virus uses computer hosts to reproduce itself?

    • Time bomb

    • Worm

    • Melissa Virus (I LOVE YOU VIRUS)

    • Macro virus

    Correct Answer
    A. Worm
    Explanation
    A worm is a type of virus that uses computer hosts to reproduce itself. Unlike other viruses, worms do not need to attach themselves to a program or file to spread. Instead, they exploit vulnerabilities in computer networks and use them to replicate and spread to other computers. This allows them to quickly infect a large number of systems and cause widespread damage.

    Rate this question:

  • 27. 

    When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as:

    • Viruses

    • Trojan Horse

    • Cracking

    • A denial of service attack

    Correct Answer
    A. A denial of service attack
    Explanation
    A denial of service attack refers to the situation where a website becomes inaccessible to its users due to a high volume of fake traffic. This attack overwhelms the website's server, causing it to crash or become unresponsive. Unlike viruses or Trojan horses that typically infect individual devices, a denial of service attack targets the website itself, disrupting its normal functioning and preventing genuine users from accessing it.

    Rate this question:

  • 28. 

    The scrambling of code is known as:

    • Encryption

    • A firewall

    • Scrambling

    • Password-proofing

    Correct Answer
    A. Encryption
    Explanation
    The scrambling of code is known as encryption. Encryption is the process of converting information or data into a code or cipher, making it unreadable to anyone who does not have the key to decrypt it. It is commonly used to protect sensitive data and ensure its confidentiality and integrity.

    Rate this question:

  • 29. 

    If you want to secure a message, use a(n):

    • Cryptology source

    • Encryption key

    • Encryption software package

    • Cryptosystem

    Correct Answer
    A. Cryptosystem
    Explanation
    A cryptosystem is the most appropriate choice for securing a message. It is a combination of cryptographic algorithms, protocols, and key management techniques that work together to provide secure communication. A cryptosystem ensures the confidentiality, integrity, and authenticity of the message by using encryption and decryption processes. It also includes mechanisms for key generation, distribution, and management. Cryptosystems are widely used in various applications, such as online banking, secure messaging, and e-commerce, to protect sensitive information from unauthorized access or interception.

    Rate this question:

  • 30. 

    Which of the following would best fit the following description – software is copied and given to a friend without the permission of the owner?

    • Freeware

    • Piracy

    • Shareware

    • Public domain

    Correct Answer
    A. Piracy
    Explanation
    Piracy is the act of illegally copying and distributing software without the permission of the owner. This involves making unauthorized copies of software and giving them to others, which is exactly what is described in the question. Freeware refers to software that is available for free, shareware is software that is distributed on a trial basis, and public domain refers to software that is not protected by copyright and can be freely used and modified.

    Rate this question:

  • 31. 

    Small files that are deposited on a user’s hard drive when they visit a Web site are best described as

    • Cookies

    • Codes

    • Profiles

    • Trackers

    Correct Answer
    A. Cookies
    Explanation
    Small files that are deposited on a user's hard drive when they visit a website are known as cookies. These cookies store information about the user's browsing activity and preferences, allowing the website to remember certain settings and provide a personalized experience. Cookies are commonly used for tracking user behavior, maintaining user sessions, and delivering targeted advertisements.

    Rate this question:

  • 32. 

    Most computer systems rely solely on ___________ for authentication.

    • Logins

    • Passwords

    • Encryption

    • Lock and key

    Correct Answer
    A. Passwords
    Explanation
    In most computer systems, passwords are commonly used for authentication. Users are required to enter a unique password that matches the one stored in the system in order to gain access. This is a widely adopted method as it provides a level of security by ensuring that only authorized users can access the system. Other options like logins, encryption, and lock and key may also be used in combination with passwords, but passwords are typically the primary means of authentication.

    Rate this question:

  • 33. 

    In the world of computing, the essential element that controls how computers are used is

    • Ethics

    • Legal laws

    • Security requirements

    • Business demands

    Correct Answer
    A. Ethics
    Explanation
    Ethics is the correct answer because it refers to the moral principles and values that govern the behavior and decision-making of individuals and organizations. In the world of computing, ethics play a crucial role in determining how computers are used. It involves considering the impact of technology on society, ensuring privacy and data protection, promoting fairness and equality, and adhering to ethical standards while developing and using computer systems. Ethics guide the responsible and ethical use of computers, ensuring that they are used in a manner that aligns with societal values and promotes the well-being of individuals and communities.

    Rate this question:

  • 34. 

    The ethical issue that involves who is able to read and use data is

    • Access

    • Property

    • Accuracy

    • Privacy

    Correct Answer
    A. Access
    Explanation
    Access is the correct answer because it pertains to the ethical issue of who has the authority to read and utilize data. This issue revolves around determining who should be granted permission to access and use certain data, as well as the potential consequences of unauthorized access. It involves considerations of fairness, transparency, and the responsible handling of sensitive information.

    Rate this question:

  • 35. 

    Programs that come into a computer system disguised as something else are called

    •   spoofers

    • Loggers

    • Defacers

    • Trojan Horse

    Correct Answer
    A. Trojan Horse
    Explanation
    A Trojan Horse is a type of malicious program that disguises itself as something harmless or desirable to trick users into downloading or executing it. Once inside the computer system, it can perform various malicious activities without the user's knowledge or consent, such as stealing personal information, damaging files, or providing unauthorized access to the system. Unlike spoofers, loggers, and defacers, which have different purposes and methods, a Trojan Horse specifically refers to this type of deceptive program.

    Rate this question:

  • 36. 

    A built-in connection to another related Web page or part of a Web page is called a ____.

    • Browser

    • Hit

    • Hyperlink

    • Jump

    Correct Answer
    A. Hyperlink
    Explanation
    A built-in connection to another related Web page or part of a Web page is called a hyperlink. Hyperlinks are clickable elements on a website that allow users to navigate to different pages or sections within the same page. They are commonly represented by underlined text or clickable buttons. By clicking on a hyperlink, users are redirected to the linked content, enabling easy and convenient navigation throughout the web.

    Rate this question:

  • 37. 

    Most computer systems rely solely on ___________ for authentication.

    • Logins

    • Passwords

    • Encryption

    • Lock and key

    Correct Answer
    A. Passwords
    Explanation
    In most computer systems, passwords are commonly used for authentication. Users are required to enter a specific password that matches their account in order to gain access to the system. This is a widely used method as it provides a level of security by ensuring that only authorized individuals can log in and access the system's resources.

    Rate this question:

  • 38. 

    The guidelines for the morally acceptable use of computers in society are

    • Computer ethics

    • Privacy

    • Morality

    • Legal systems

    Correct Answer
    A. Computer ethics
    Explanation
    Computer ethics refers to the ethical principles and guidelines that govern the use of computers and technology in society. It involves understanding and addressing ethical issues related to privacy, security, intellectual property, and the impact of technology on individuals and society as a whole. Computer ethics provides a framework for individuals and organizations to make morally acceptable decisions and actions regarding the use of computers and technology. It ensures that technology is used responsibly, ethically, and in a way that respects the rights and well-being of individuals and society.

    Rate this question:

  • 39. 

    When a hard disk crashes, it is an example of a __________ type of computer security threat.

    • Natural hazard

    • Criminal

    • Technological failure

    • Civil strife

    Correct Answer
    A. Technological failure
    Explanation
    A hard disk crash refers to a situation where the storage device of a computer fails, resulting in the loss of data and the inability to access information. This failure is caused by a technical problem within the computer system, such as a malfunctioning component or software error. It is not related to criminal activity or civil strife, which involve intentional actions by individuals or groups. Therefore, a hard disk crash is considered a technological failure rather than a security threat posed by criminals or external factors.

    Rate this question:

  • 40. 

    ____ program reads pages on Web sites in order to create an index of hits.

    • Engine

    • Directory

    • Catalog

    • Crawler

    Correct Answer
    A. Directory
    Explanation
    A directory program is responsible for reading pages on websites in order to create an index of hits. This program scans through the web pages and collects information about the content on those pages. It then organizes this information into a structured index, making it easier for users to search and find relevant content. Unlike search engines that use complex algorithms to rank pages, a directory program simply creates a catalog of pages based on their content.

    Rate this question:

  • 41. 

    What is the name for a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document?

    • Spyware

    • Virus

    • Firewall

    • Trojan Horse

    Correct Answer
    A. Virus
    Explanation
    A virus is a program or programming code that replicates itself by being copied or initiating its copying to another program, computer boot sector, or document. Unlike spyware, which is designed to gather information without the user's knowledge, a virus is specifically created to spread and cause harm to the infected system. Firewalls, on the other hand, are security measures that protect against unauthorized access to a network, while a Trojan Horse is a type of malware that disguises itself as legitimate software to deceive users and gain unauthorized access to their systems.

    Rate this question:

  • 42. 

    ___ is the measurement of things such as fingerprints and retinal scans used for security access.

    • Biometrics

    • Biomeasurement

    • Computer Security

    • Smart weapon machinery

    Correct Answer
    A. Biometrics
    Explanation
    Biometrics refers to the measurement of unique physical or behavioral characteristics such as fingerprints and retinal scans. These measurements are used for security access as they provide a highly accurate and reliable way to identify individuals. Biometrics is widely used in various industries and applications, including access control systems, border control, and personal devices like smartphones and laptops. It offers a more secure and convenient alternative to traditional methods like passwords or ID cards.

    Rate this question:

  • 43. 

    An attempt to slow down or stop a computer system or network by flooding the system with requests for information is called a

    • Viruses

    • Worm

    • Denial-of-service attack

    • Trojan Horse

    Correct Answer
    A. Denial-of-service attack
    Explanation
    A denial-of-service attack is the deliberate attempt to overwhelm a computer system or network by flooding it with a high volume of requests for information. This flood of requests consumes the system's resources, such as bandwidth or processing power, making it unable to respond to legitimate requests. This type of attack aims to disrupt the normal functioning of a system or network, rendering it slow or completely unavailable to users. Unlike viruses, worms, or Trojan Horses, which are forms of malware that infect or damage systems, a denial-of-service attack focuses on rendering the system inaccessible rather than causing direct harm.

    Rate this question:

  • 44. 

    Collecting personal information and effectively posing as another individual is known as the crime of:

    • Spooling

    • Identity theft

    • Spoofing

    • Hacking

    Correct Answer
    A. Identity theft
    Explanation
    Identity theft refers to the act of collecting personal information and impersonating someone else. This crime involves fraudulently obtaining and using someone's personal data, such as their social security number or credit card information, for financial gain or other malicious purposes. The perpetrator may use this stolen identity to make unauthorized transactions, open fraudulent accounts, or commit other illegal activities. Therefore, identity theft is the correct answer in this case.

    Rate this question:

  • 45. 

    What is the name of an application program that gathers user information and sends it to someone through the Internet?

    • A Virus

    • Spybot

    • Logic Bomb

    • Security patch

    Correct Answer
    A. Spybot
    Explanation
    A spybot is an application program that gathers user information and sends it to someone through the Internet. Unlike a virus or logic bomb, which may cause harm to a computer system, a spybot is specifically designed to collect and transmit user data without the user's knowledge or consent. It is a form of malware that invades privacy and can be used for malicious purposes such as identity theft or unauthorized surveillance. A security patch, on the other hand, is a software update designed to fix vulnerabilities or improve security in an application or operating system.

    Rate this question:

  • 46. 

    A __________ acts as a security buffer between a company’s private network and all external networks.

    • Firewall

    • Passwords

    • Disaster recovery plan

    • Virus checker

    Correct Answer
    A. Firewall
    Explanation
    A firewall is a security measure that acts as a barrier between a company's private network and external networks. It monitors and controls incoming and outgoing network traffic based on predetermined security rules. By examining the data packets, a firewall can block unauthorized access, prevent malicious attacks, and protect sensitive information from being compromised. It serves as a first line of defense against potential threats and helps maintain the confidentiality, integrity, and availability of the company's network resources.

    Rate this question:

  • 47. 

    ____ provide Internet access and have many members-only features that offer a variety of special content and services.

    • ISPs

    • LANs

    • OSPs

    • Networks

    Correct Answer
    A. OSPs
    Explanation
    OSPs, or Online Service Providers, provide Internet access and have many members-only features that offer a variety of special content and services. Unlike ISPs (Internet Service Providers) that primarily focus on providing Internet connectivity, OSPs go beyond that by offering additional features and services exclusively for their members. This can include things like exclusive content, online communities, personalized recommendations, and other value-added services that enhance the overall online experience for their users. LANs (Local Area Networks) and Networks are not specifically related to providing Internet access or members-only features, making OSPs the most fitting choice for the given explanation.

    Rate this question:

  • 48. 

    A program that migrates through networks and operating systems and attaches itself to different programs and databases is a __________.

    • Viruses

    • Worms

    • Denial-of-service attack

    • Damage

    Correct Answer
    A. Viruses
    Explanation
    A program that migrates through networks and operating systems and attaches itself to different programs and databases is referred to as a virus. Viruses are malicious software that replicate themselves and spread to other systems, often causing harm by corrupting or deleting files, stealing sensitive information, or disrupting normal system operations. Unlike worms, which can spread independently without attaching to other programs, viruses require a host program to infect and propagate. Denial-of-service attacks and damage, on the other hand, are not specifically related to the behavior described in the question.

    Rate this question:

  • 49. 

    The issues that deal with the collection and use of data about individuals is

    • Access

    • Property

    • Accuracy

    • Privacy

    Correct Answer
    A. Privacy
    Explanation
    The correct answer is privacy. This is because privacy refers to the protection of personal information and the control individuals have over how their data is collected, used, and shared. It involves ensuring that individuals have the right to keep their personal information confidential and that organizations handle their data in a secure and responsible manner. Privacy issues are concerned with maintaining the privacy rights of individuals and preventing unauthorized access or misuse of their personal data.

    Rate this question:

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 04, 2014
    Quiz Created by
    Jscansino
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.