Toughest Computer Networking: Quiz!

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Jscansino
J
Jscansino
Community Contributor
Quizzes Created: 2 | Total Attempts: 521
Questions: 100 | Attempts: 414

SettingsSettingsSettings
Toughest Computer Networking: Quiz! - Quiz

.


Questions and Answers
  • 1. 

    ____ provides Internet access and have many members-only features that offer a variety of special content and services.

    • A.

      ISPs

    • B.

      LANs

    • C.

      OSPs

    • D.

      Networks

    Correct Answer
    C. OSPs
    Explanation
    OSPs, or Online Service Providers, are platforms or companies that provide internet access and offer exclusive features and services to their members. These OSPs typically have a range of special content, such as online communities, forums, chat rooms, and other interactive features, that are only accessible to their members. Additionally, they may offer additional services like email accounts, online storage, and personalized content. Overall, OSPs play a significant role in providing internet access and enhancing the online experience for their members.

    Rate this question:

  • 2. 

    ___ provides wireless Internet access to users with wireless modems or Web-enabled handheld computers or devices.

    • A.

      ISPs

    • B.

      WSPs

    • C.

      OSPs

    • D.

      WANs

    Correct Answer
    B. WSPs
    Explanation
    WSPs, or Wireless Service Providers, provide wireless Internet access to users with wireless modems or Web-enabled handheld computers or devices. These providers offer connectivity through wireless networks, allowing users to access the internet without the need for physical connections or cables. WSPs typically operate by installing wireless access points in specific locations, such as cafes, airports, or homes, and users can connect to these access points using their wireless devices.

    Rate this question:

  • 3. 

    The domain name in the URL http://www.scsite.com/dc2003/ch2 is ____.

    • A.

      Http://

    • B.

      Www.scsite.com/

    • C.

      Dc2002/

    • D.

      Ch2

    Correct Answer
    B. Www.scsite.com/
    Explanation
    The domain name in the given URL is www.scsite.com. It is the part of the URL that identifies the specific website or web page that the user wants to access. In this case, the domain name is followed by additional directories (dc2003/ch2) that specify the specific location within the website.

    Rate this question:

  • 4. 

    ____ program reads pages on Web sites in order to create an index of hits.

    • A.

      Engine

    • B.

      Directory

    • C.

      Catalog

    • D.

      Crawler

    Correct Answer
    B. Directory
    Explanation
    A directory program is responsible for reading pages on websites to create an index of hits. This means that it scans the content of web pages and gathers information about them, such as keywords or relevant data, to create a searchable index. Unlike search engines that use algorithms to rank and display search results, a directory program focuses on organizing and categorizing web pages into specific directories or categories.

    Rate this question:

  • 5. 

    Web pages that list as the result of a search are called ____.

    • A.

      Finds

    • B.

      Spiders

    • C.

      Hits

    • D.

      Keywords

    Correct Answer
    D. Keywords
    Explanation
    Web pages that list as the result of a search are called "keywords" because keywords are the specific words or phrases that users enter into a search engine to find relevant information. When a search is performed, the search engine scans through its database and retrieves web pages that contain these keywords. The search engine then displays these web pages as search results, allowing users to find the information they are looking for. Therefore, the term "keywords" accurately describes the web pages that appear as search results.

    Rate this question:

  • 6. 

    A built-in connection to another related Web page or part of a Web page is called a ____.

    • A.

      Browser

    • B.

      Hit

    • C.

      Hyperlink

    • D.

      Jump

    Correct Answer
    C. Hyperlink
    Explanation
    A built-in connection to another related Web page or part of a Web page is called a hyperlink. Hyperlinks are clickable elements on a website that allow users to navigate to different pages or sections within the same page. They are commonly represented by underlined text or clickable buttons. By clicking on a hyperlink, users are redirected to the linked content, enabling easy and convenient navigation throughout the web.

    Rate this question:

  • 7. 

    When you want to transfer files between computers, the best Internet service to use is

    • A.

      Instant Messaging

    • B.

      FTP

    • C.

      Chat

    • D.

      Usenet

    Correct Answer
    B. FTP
    Explanation
    FTP (File Transfer Protocol) is the best Internet service to use when transferring files between computers. FTP is specifically designed for file transfer and allows users to easily upload, download, and manage files on remote servers. Unlike instant messaging, chat, or Usenet, FTP is dedicated solely to file transfer and offers more reliable and efficient transfer speeds. Therefore, FTP is the most suitable and effective option for transferring files between computers over the Internet.

    Rate this question:

  • 8. 

    In networking, bandwidth refers to

    • A.

      The speed at which a modem can operate

    • B.

      The storage capacity of your email account

    • C.

      The protocols used for Internet information

    • D.

      The carrying capacity of the transmission media for sending information

    Correct Answer
    D. The carrying capacity of the transmission media for sending information
    Explanation
    Bandwidth in networking refers to the maximum amount of data that can be transmitted over a network in a given amount of time. It represents the carrying capacity of the transmission media, such as cables or wireless connections, for sending information. The higher the bandwidth, the more data can be transmitted at a faster speed. Therefore, the correct answer is "The carrying capacity of the transmission media for sending information."

    Rate this question:

  • 9. 

    If you want to connect your home computer so that you can view your school's website, in addition to your computer and modem you will need

    • A.

      DSL, a browser, and the correct protocols

    • B.

      An ISDN line, Windows, and an ISP

    • C.

      Both an ISDN and DSL line and a browser.

    • D.

      An ISP, browser, and your school's URL

    Correct Answer
    A. DSL, a browser, and the correct protocols
    Explanation
    To connect your home computer and view your school's website, you will need DSL, a browser, and the correct protocols. DSL (Digital Subscriber Line) is a type of internet connection that uses telephone lines to transmit data. A browser is a software application used to access and view websites. The correct protocols refer to the set of rules and procedures that govern the communication between devices on a network. These protocols ensure that data is transmitted and received correctly. Therefore, having DSL, a browser, and the correct protocols is necessary to establish a connection and access your school's website.

    Rate this question:

  • 10. 

    Listservers are useful in helping teachers keep up with new ideas by:

    • A.

      Allowing real-time, live chats between subscribers

    • B.

      Listing new services on a community bulletin board

    • C.

      Automatically sending information to your email box

    • D.

      None of the above

    Correct Answer
    C. Automatically sending information to your email box
    Explanation
    Listservers are online mailing lists that automatically send information and updates to subscribers' email boxes. This allows teachers to stay informed about new ideas, resources, and services without actively searching for them. Real-time chats and community bulletin boards may also be helpful, but the most direct and efficient way for teachers to keep up with new ideas is through the automatic delivery of information to their email boxes.

    Rate this question:

  • 11. 

    What is the name for a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document?

    • A.

      Spyware

    • B.

      Virus

    • C.

      Firewall

    • D.

      Trojan Horse

    Correct Answer
    B. Virus
    Explanation
    A virus is a program or programming code that replicates itself by being copied or initiating its copying to another program, computer boot sector, or document. Unlike spyware, which collects information without the user's consent, or a firewall, which protects against unauthorized access, a virus is specifically designed to replicate and spread, often causing harm to the infected system. A Trojan Horse, on the other hand, disguises itself as a legitimate program but contains malicious code, which is different from a virus that replicates itself.

    Rate this question:

  • 12. 

    What do you call a program used to detect unsolicited and unwanted e-mail and prevents those messages from getting to a user's inbox?

    • A.

      Anti-spammer

    • B.

      Email guard

    • C.

      Virus filter

    • D.

      Spam filter

    Correct Answer
    A. Anti-spammer
    Explanation
    The correct answer is "Spam filter". A spam filter is a program that is used to detect and prevent unsolicited and unwanted emails from reaching a user's inbox. It helps in reducing the amount of spam that a user receives by filtering out these unwanted messages. The term "anti-spammer" refers to a person or entity that actively works against sending spam emails, rather than being a program used for detecting and preventing spam. "Email guard" and "Virus filter" are not specifically related to the prevention of spam emails.

    Rate this question:

  • 13. 

    What type of attack relies on the trusting nature of employees and the art of deception?

    • A.

      Social Engineering

    • B.

      Fraud

    • C.

      Phishing

    • D.

      Dumpster Driving

    Correct Answer
    A. Social Engineering
    Explanation
    Social engineering is a type of attack that exploits the trusting nature of employees and relies on the art of deception. It involves manipulating individuals into divulging sensitive information or performing actions that may compromise security. This can be achieved through various techniques such as impersonation, phishing, or psychological manipulation. The attacker takes advantage of human vulnerabilities to gain unauthorized access to systems or obtain confidential information.

    Rate this question:

  • 14. 

    What can a firewall protect against?

    • A.

      Viruses

    • B.

      Unauthenticated interactive logins from the outside world

    • C.

      Fire

    • D.

      Connecting to and from the outside world

    Correct Answer
    B. Unauthenticated interactive logins from the outside world
    Explanation
    A firewall can protect against unauthenticated interactive logins from the outside world. This means that it can prevent unauthorized access to a network or system from external sources. By filtering incoming connections and verifying user credentials, a firewall acts as a barrier between the internal network and external threats, ensuring that only authenticated users can access the system. This helps to prevent unauthorized access, data breaches, and potential security risks.

    Rate this question:

  • 15. 

    Which of the following is an example of a strong password?

    • A.

      Password

    • B.

      J*p2le04>F

    • C.

      Your real name, user name, or company name

    • D.

      Your birthdate

    Correct Answer
    B. J*p2le04>F
    Explanation
    The password "J*p2le04>F" is an example of a strong password because it includes a combination of uppercase and lowercase letters, numbers, and special characters. This makes it more difficult for hackers to guess or crack the password through brute force or dictionary attacks. Additionally, the password is sufficiently long, which further enhances its strength.

    Rate this question:

  • 16. 

    The majority of computer crimes are committed by:

    • A.

      Hackers

    • B.

      Insiders

    • C.

      Overseas criminals

    • D.

      Young teenage computer genius

    Correct Answer
    B. Insiders
    Explanation
    Insiders are the correct answer because they have access to sensitive information and systems within an organization, making it easier for them to commit computer crimes. They may include disgruntled employees, contractors, or anyone with authorized access to the organization's network. Insiders have the knowledge and familiarity with the organization's systems, making it harder to detect their actions and easier for them to cover their tracks. This makes them a significant threat when it comes to computer crimes.

    Rate this question:

  • 17. 

    The common name for the crime of stealing passwords is:

    • A.

      Spooling

    • B.

      Identity theft

    • C.

      Spoofing

    • D.

      Hacking

    Correct Answer
    C. Spoofing
    Explanation
    Spoofing refers to the act of disguising oneself or faking one's identity in order to deceive others. In the context of stealing passwords, spoofing involves creating a fake website or email that appears legitimate, tricking the user into entering their login credentials. This allows the attacker to gain unauthorized access to the user's account or personal information. Therefore, spoofing is the common name for the crime of stealing passwords.

    Rate this question:

  • 18. 

    Collecting personal information and effectively posing as another individual is known as the crime of:

    • A.

      Spooling

    • B.

      Identity theft

    • C.

      Spoofing

    • D.

      Hacking

    Correct Answer
    B. Identity theft
    Explanation
    Identity theft refers to the act of collecting personal information and impersonating someone else. This crime involves fraudulently obtaining and using someone's personal data, such as their social security number or credit card information, for financial gain or other malicious purposes. The perpetrator may use this stolen identity to make unauthorized transactions, open fraudulent accounts, or commit other illegal activities. Therefore, identity theft is the correct answer in this case.

    Rate this question:

  • 19. 

    A program that performs a useful task while simultaneously allowing destructive acts is a:

    • A.

      Worm

    • B.

      Trojan Horse

    • C.

      Virus

    • D.

      Macro virus

    Correct Answer
    B. Trojan Horse
    Explanation
    A Trojan Horse is a type of malicious software that appears to be legitimate or useful, but actually contains hidden destructive elements. Unlike viruses or worms, which can spread on their own, a Trojan Horse relies on the user to unknowingly install or execute it. Once inside a system, it can perform a useful task to deceive the user, while also carrying out destructive acts in the background without the user's knowledge or consent. This makes the Trojan Horse a particularly dangerous and deceptive form of malware.

    Rate this question:

  • 20. 

    An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:

    • A.

      Trojan horse

    • B.

      Virus

    • C.

      Time-bomb

    • D.

      Malware

    Correct Answer
    B. Virus
    Explanation
    A virus is a type of malicious software that is designed to replicate itself and spread from one computer to another. It can infect programs or files, causing them to become corrupted or malfunction. Unlike Trojan horses, viruses have the ability to self-replicate and spread without the user's knowledge or consent. Therefore, a virus is the correct answer for the given question.

    Rate this question:

  • 21. 

    What type of virus uses computer hosts to reproduce itself?

    • A.

      Time bomb

    • B.

      Worm

    • C.

      Melissa Virus (I LOVE YOU VIRUS)

    • D.

      Macro virus

    Correct Answer
    B. Worm
    Explanation
    A worm is a type of virus that uses computer hosts to reproduce itself. Unlike other viruses, worms can spread without any human action and can replicate themselves across networks. They exploit vulnerabilities in computer systems to gain access and then use the host's resources to create copies of themselves and spread to other computers. Worms can cause significant damage by consuming network bandwidth and resources, slowing down or crashing systems, and even deleting or modifying files. They are known for their ability to quickly propagate and infect large numbers of computers.

    Rate this question:

  • 22. 

    What is the name of an application program that gathers user information and sends it to someone through the Internet?

    • A.

      A Virus

    • B.

      Spybot

    • C.

      Logic Bomb

    • D.

      Security patch

    Correct Answer
    B. Spybot
    Explanation
    A spybot is an application program that gathers user information and sends it to someone through the Internet. Unlike a virus or logic bomb, which may cause harm to a computer system, a spybot is specifically designed to collect and transmit user data without the user's knowledge or consent. It is a form of malware that invades privacy and can be used for malicious purposes such as identity theft or unauthorized surveillance. A security patch, on the other hand, is a software update designed to fix vulnerabilities or improve security in an application or operating system.

    Rate this question:

  • 23. 

    HTML viruses infect:

    • A.

      Your computer

    • B.

      A web page in HTML code

    • C.

      Both a Web page and the computer that is viewing it

    • D.

      None of the above

    Correct Answer
    B. A web page in HTML code
    Explanation
    HTML viruses infect a web page in HTML code. HTML (Hypertext Markup Language) is the standard language used to create web pages. Viruses that target HTML code can insert malicious scripts or code into web pages, which can then infect the computers of users who visit those pages. This type of virus can spread through websites, emails, or other means of transmitting HTML code. It does not directly infect the computer itself, but rather exploits vulnerabilities in the HTML code of web pages to infect the computers of users who access those pages.

    Rate this question:

  • 24. 

    When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as:

    • A.

      Viruses

    • B.

      Trojan Horse

    • C.

      Cracking

    • D.

      A denial of service attack

    Correct Answer
    D. A denial of service attack
    Explanation
    A denial of service attack refers to the situation when a website becomes inaccessible to its customers due to an overwhelming amount of fake traffic. This attack floods the website's server with an excessive number of requests, causing it to slow down or crash. Unlike viruses or Trojan horses, which are malicious software, a denial of service attack does not involve the installation of any harmful programs on the target system. Instead, it disrupts the normal functioning of the website by overwhelming its resources with fake requests, making it impossible for genuine users to access it.

    Rate this question:

  • 25. 

    ___ is the measurement of things such as fingerprints and retinal scans used for security access.

    • A.

      Biometrics

    • B.

      Biomeasurement

    • C.

      Computer Security

    • D.

      Smart weapon machinery

    Correct Answer
    A. Biometrics
    Explanation
    Biometrics refers to the measurement and analysis of unique physical or behavioral characteristics, such as fingerprints and retinal scans, for the purpose of identification and security access. It is a widely used method in computer security systems to ensure authorized access to sensitive information or restricted areas. Biometrics offers a high level of accuracy and reliability in verifying an individual's identity, making it an effective tool for enhancing security measures.

    Rate this question:

  • 26. 

    What is the most common tool used to restrict access to a computer system?

    • A.

      User logins

    • B.

      Passwords

    • C.

      Computer keys

    • D.

      Access-control Software

    Correct Answer
    B. Passwords
    Explanation
    Passwords are the most common tool used to restrict access to a computer system. They serve as a form of authentication, ensuring that only authorized individuals can gain entry. By requiring users to input a specific combination of characters, passwords act as a barrier against unauthorized access and protect sensitive information. They are widely used across various platforms and applications, making them an essential component of computer system security.

    Rate this question:

  • 27. 

    The most common passwords in the U.S. or Britain include all EXCEPT:

    • A.

      Love

    • B.

      Fred

    • C.

      God

    • D.

      123

    Correct Answer
    D. 123
    Explanation
    The given options consist of common passwords, but the exception is "123". This is because "123" is a simple and easily guessable password that does not meet the criteria of a strong and secure password. On the other hand, "love", "Fred", and "God" are also commonly used passwords, but they are not excluded in this case.

    Rate this question:

  • 28. 

    The scrambling of code is known as:

    • A.

      Encryption

    • B.

      A firewall

    • C.

      Scrambling

    • D.

      Password-proofing

    Correct Answer
    A. Encryption
    Explanation
    Encryption refers to the process of converting plaintext into ciphertext to protect sensitive information from unauthorized access. It involves using algorithms and keys to transform the data into an unreadable format, which can only be decrypted with the correct key. Scrambling, password-proofing, and firewalls may provide some level of security, but they are not specifically related to the process of code scrambling. Encryption is the correct term for this process.

    Rate this question:

  • 29. 

    If you want to secure a message, use a(n):

    • A.

      Cryptology source

    • B.

      Encryption key

    • C.

      Encryption software package

    • D.

      Cryptosystem

    Correct Answer
    D. Cryptosystem
    Explanation
    A cryptosystem is the most appropriate choice for securing a message because it is a complete system that includes encryption, decryption, and key management. It provides a comprehensive approach to protecting the confidentiality and integrity of the message. Cryptology source refers to a source of knowledge about cryptography, not a tool for securing a message. An encryption key is a component of a cryptosystem, but it alone is not sufficient for securing a message. Similarly, an encryption software package is a tool that can be used within a cryptosystem, but it is not the entire system itself.

    Rate this question:

  • 30. 

    _____ is defined as any crime completed through the use of computer technology.

    • A.

      Computer forensics

    • B.

      Computer Crimes

    • C.

      Hacking

    • D.

      Cracking

    Correct Answer
    B. Computer Crimes
    Explanation
    Computer Crimes is defined as any crime completed through the use of computer technology. This term encompasses a wide range of illegal activities that involve the manipulation, theft, or destruction of data, as well as unauthorized access to computer systems. Examples of computer crimes include hacking, identity theft, phishing, and spreading malware. These crimes exploit vulnerabilities in computer networks and systems, causing harm to individuals, organizations, and even governments. The term "Computer Crimes" emphasizes the criminal nature of these activities when they are carried out using computer technology.

    Rate this question:

  • 31. 

    Most computer systems rely solely on ___________ for authentication.

    • A.

      Logins

    • B.

      Passwords

    • C.

      Encryption

    • D.

      Lock and key

    Correct Answer
    B. Passwords
    Explanation
    In most computer systems, passwords are commonly used for authentication. Users are required to enter a specific password that matches their account in order to gain access to the system. This is a widely used method as it provides a level of security by ensuring that only authorized individuals can log in and access the system's resources.

    Rate this question:

  • 32. 

    Creating strong computer security to prevent computer crime usually simultaneously helps protect :

    • A.

      Privacy rights

    • B.

      Personal ethics

    • C.

      The number of cookies downloaded to your personal computer

    • D.

      Personal space

    Correct Answer
    A. Privacy rights
    Explanation
    Creating strong computer security measures such as encryption, firewalls, and secure authentication methods can help prevent unauthorized access to personal information and data. By safeguarding sensitive information, computer security measures contribute to protecting privacy rights. This ensures that individuals have control over their personal information and are not subject to unauthorized surveillance or data breaches. Therefore, creating strong computer security usually simultaneously helps protect privacy rights.

    Rate this question:

  • 33. 

    In the world of computing, the essential element that controls how computers are used is

    • A.

      Ethics

    • B.

      Legal laws

    • C.

      Security requirements

    • D.

      Business demands

    Correct Answer
    A. Ethics
    Explanation
    Ethics is the correct answer because it refers to the moral principles that govern the behavior and decisions of individuals and organizations. In the world of computing, ethics play a crucial role in determining how computers are used. It involves considering the impact of technology on society, protecting user privacy, ensuring fairness and equality, and promoting responsible use of technology. Adhering to ethical principles helps in creating a positive and trustworthy computing environment and ensures that computers are used in a way that benefits society as a whole.

    Rate this question:

  • 34. 

    The guidelines for the morally acceptable use of computers in society are

    • A.

      Computer ethics

    • B.

      Privacy

    • C.

      Morality

    • D.

      Legal systems

    Correct Answer
    A. Computer ethics
    Explanation
    Computer ethics refers to the ethical principles and guidelines that govern the use of computers and technology in society. It involves understanding and addressing ethical issues related to privacy, security, intellectual property, and the impact of technology on individuals and society as a whole. Computer ethics provides a framework for individuals and organizations to make morally acceptable decisions and actions regarding the use of computers and technology. It ensures that technology is used responsibly, ethically, and in a way that respects the rights and well-being of individuals and society.

    Rate this question:

  • 35. 

    The issues that deal with the collection and use of data about individuals is

    • A.

      Access

    • B.

      Property

    • C.

      Accuracy

    • D.

      Privacy

    Correct Answer
    D. Privacy
    Explanation
    The correct answer is privacy. This is because privacy refers to the protection of personal information and the control individuals have over how their data is collected, used, and shared. It involves ensuring that individuals have the right to keep their personal information confidential and that organizations handle their data in a secure and responsible manner. Privacy issues are concerned with maintaining the privacy rights of individuals and preventing unauthorized access or misuse of their personal data.

    Rate this question:

  • 36. 

    The ethical issue concerned with the correctness of data collected is

    • A.

      Access

    • B.

      Property

    • C.

      Exactness

    • D.

      Privacy

    Correct Answer
    C. Exactness
    Explanation
    The ethical issue concerned with the correctness of data collected is "exactness". This refers to the accuracy and precision of the data that is being collected. Ensuring that the data is collected and recorded accurately is important for maintaining the integrity of any research or study. Inaccurate data can lead to incorrect conclusions and potentially harm individuals or organizations that rely on the data for decision-making. Therefore, it is ethically important to prioritize the exactness of the data collected to ensure its reliability and validity.

    Rate this question:

  • 37. 

    The ethical issue that involves who is able to read and use data is

    • A.

      Access

    • B.

      Property

    • C.

      Accuracy

    • D.

      Privacy

    Correct Answer
    A. Access
    Explanation
    Access is the correct answer because the ethical issue mentioned in the question is related to who has the ability to read and use data. Access refers to the permission or authority granted to individuals or entities to access and use certain data. This ethical issue raises concerns about who should have access to sensitive or private data, and whether it should be restricted to certain individuals or organizations. It also relates to issues of data ownership and control.

    Rate this question:

  • 38. 

    Small files that are deposited on a user’s hard drive when they visit a Web site are best described as

    • A.

      Cookies

    • B.

      Codes

    • C.

      Profiles

    • D.

      Trackers

    Correct Answer
    A. Cookies
    Explanation
    Small files that are deposited on a user's hard drive when they visit a website are known as cookies. These cookies store information about the user's browsing activity and preferences, allowing the website to remember certain settings and provide a personalized experience. Cookies are commonly used for tracking user behavior, maintaining user sessions, and delivering targeted advertisements.

    Rate this question:

  • 39. 

    People who gain unauthorized access to computers for the fun of it, but do not intentionally do damage, are __________.

    • A.

      Employees

    • B.

      Hackers

    • C.

      Crackers

    • D.

      Members of organized crimes

    Correct Answer
    B. Hackers
    Explanation
    Hackers are individuals who gain unauthorized access to computers for the fun of it, but do not intentionally cause harm. They are often motivated by curiosity and a desire to explore and understand computer systems. Unlike crackers, who exploit vulnerabilities for malicious purposes, hackers typically engage in activities like exploring networks, finding security flaws, and enhancing their technical skills. While their actions may still be illegal and unethical, hackers generally do not have malicious intent and may even contribute positively to the field of cybersecurity by identifying vulnerabilities that need to be addressed.

    Rate this question:

  • 40. 

    A program that migrates through networks and operating systems and attaches itself to different programs and databases is a __________.

    • A.

      Viruses

    • B.

      Worms

    • C.

      Denial-of-service attack

    • D.

      Damage

    Correct Answer
    A. Viruses
    Explanation
    A program that migrates through networks and operating systems and attaches itself to different programs and databases is known as a virus. Viruses are malicious software that can replicate themselves and spread to other systems, causing harm by corrupting or deleting files, stealing personal information, or disrupting the normal functioning of a computer. Unlike worms, which are self-replicating and do not require a host program to spread, viruses rely on attaching themselves to existing programs or files in order to propagate. Denial-of-service attacks and damage do not involve the same characteristics of migrating and attaching to different programs and databases.

    Rate this question:

  • 41. 

    A program that fills a computer system with self-replicating information thus clogging the system is called a __________.

    • A.

      Viruses

    • B.

      Worms

    • C.

      Denial-of-service attack

    • D.

      Damage

    Correct Answer
    B. Worms
    Explanation
    A program that fills a computer system with self-replicating information thus clogging the system is called worms. Worms are malicious software that can spread across networks and computers, replicating themselves and consuming system resources. Unlike viruses, worms do not require a host program to attach themselves to, making them capable of spreading independently. They can cause significant damage by slowing down or crashing computer systems, stealing sensitive information, or creating backdoors for hackers to exploit. Denial-of-service attacks, on the other hand, involve overwhelming a system with traffic to make it inaccessible, while damage is a general term that can refer to any harm caused to a computer system.

    Rate this question:

  • 42. 

    Which statement best describes a worm?

    • A.

      A virus that is designed to destroy your hard drive

    • B.

      A virus that is designed to frighten people about a nonexistent virus

    • C.

      a virus that doesn’t attach itself to programs and databases

    • D.

      a virus that is designed to shut down a server

    Correct Answer
    C. a virus that doesn’t attach itself to programs and databases
    Explanation
    A worm is a type of virus that does not attach itself to programs and databases. Unlike other viruses, worms are standalone programs that can replicate themselves and spread to other computers through network connections. They do not require a host program to infect and can cause harm by consuming network bandwidth, slowing down systems, or carrying out malicious activities such as data theft or denial of service attacks.

    Rate this question:

  • 43. 

    Programs that come into a computer system disguised as something else are called

    • A.

        spoofers

    • B.

      loggers

    • C.

      Defacers

    • D.

      Trojan Horse

    Correct Answer
    D. Trojan Horse
    Explanation
    A Trojan Horse is a type of malicious program that disguises itself as something else to gain access to a computer system. It tricks users into thinking it is a legitimate program or file, but once installed, it can perform harmful actions such as stealing personal information, damaging files, or providing unauthorized access to the attacker. Unlike spoofers, loggers, and defacers, which may have different objectives, a Trojan Horse specifically focuses on deceptive infiltration and malicious activities.

    Rate this question:

  • 44. 

    An attempt to slow down or stop a computer system or network by flooding the system with requests for information is called a

    • A.

      Viruses

    • B.

      Worm

    • C.

      Denial-of-service attack

    • D.

      Trojan Horse

    Correct Answer
    C. Denial-of-service attack
    Explanation
    A denial-of-service attack is a deliberate attempt to overwhelm a computer system or network by flooding it with requests for information, thereby slowing down or completely stopping its normal functioning. This can be done by sending a massive amount of traffic or requests to the targeted system, causing it to become overloaded and unable to respond to legitimate requests. Unlike viruses, worms, and Trojan Horses, which are malicious software designed to infiltrate and damage systems, a denial-of-service attack focuses on disrupting the availability of a system rather than causing direct harm.

    Rate this question:

  • 45. 

    A fraudulent or deceptive act or operation designed to trick individuals into spending their time and money for little or no return is called a

    • A.

      Annoyance

    • B.

      Worm

    • C.

      Attack

    • D.

      Scam

    Correct Answer
    D. Scam
    Explanation
    A fraudulent or deceptive act or operation designed to trick individuals into spending their time and money for little or no return is called a scam. Scams are typically carried out by individuals or organizations with the intention of defrauding or deceiving unsuspecting victims. They often involve false promises, fake products or services, or misleading information in order to manipulate people into giving up their money or personal information. Scams can take various forms, such as online scams, phone scams, or email scams, and they can have serious financial and emotional consequences for those who fall victim to them.

    Rate this question:

  • 46. 

    Which of the following would best fit the following description – software is copied and given to a friend without the permission of the owner?

    • A.

      Freeware

    • B.

      Piracy

    • C.

      Shareware

    • D.

      Public domain

    Correct Answer
    B. Piracy
    Explanation
    Piracy is the act of illegally copying and distributing software without the permission of the owner. This involves making unauthorized copies of software and sharing them with others, which is a violation of copyright laws. Freeware refers to software that is available for free, shareware refers to software that can be downloaded and used for a trial period before purchasing, and public domain refers to software that is not protected by copyright and can be freely used and distributed. Therefore, piracy is the most appropriate term to describe the act of copying and distributing software without permission.

    Rate this question:

  • 47. 

    When a hard disk crashes, it is an example of a __________ type of computer security threat.

    • A.

      Natural hazard

    • B.

      Criminal

    • C.

      Technological failure

    • D.

      Civil strife

    Correct Answer
    C. Technological failure
    Explanation
    A hard disk crash refers to a situation where the storage device of a computer fails, resulting in the loss of data and the inability to access information. This failure is caused by a technical problem within the computer system, such as a malfunctioning component or software error. It is not related to criminal activity or civil strife, which involve intentional actions by individuals or groups. Therefore, a hard disk crash is considered a technological failure rather than a security threat posed by criminals or external factors.

    Rate this question:

  • 48. 

    A common way to protect information being sent over a network, when long distance is involved, is

    • A.

      Spying

    • B.

      Setting up a firewall

    • C.

      Passwording

    • D.

      Encrypting

    Correct Answer
    D. Encrypting
    Explanation
    Encrypting is a common way to protect information being sent over a network, especially when long distance is involved. Encryption involves converting the original information into a coded form that can only be decoded by authorized parties who possess the decryption key. This ensures that even if the information is intercepted by unauthorized individuals, they will not be able to understand or access the sensitive data. Encrypting provides an additional layer of security and helps safeguard the confidentiality and integrity of the transmitted information.

    Rate this question:

  • 49. 

    A __________ acts as a security buffer between a company’s private network and all external networks.

    • A.

      Firewall

    • B.

      Passwords

    • C.

      Disaster recovery plan

    • D.

      Virus checker

    Correct Answer
    A. Firewall
    Explanation
    A firewall is a security measure that acts as a barrier between a company's private network and external networks. It monitors and controls incoming and outgoing network traffic based on predetermined security rules. By examining the data packets, a firewall can block unauthorized access, prevent malicious attacks, and protect sensitive information from being compromised. It serves as a first line of defense against potential threats and helps maintain the confidentiality, integrity, and availability of the company's network resources.

    Rate this question:

  • 50. 

    The study of fitting computers to people is called __________.

    • A.

      Macro building

    • B.

      Kinesthenics

    • C.

      Ergonomics

    • D.

      Chiropractic

    Correct Answer
    C. Ergonomics
    Explanation
    Ergonomics is the study of fitting computers to people. It focuses on designing and arranging computer systems and workspaces in a way that maximizes efficiency, comfort, and safety for the individuals using them. It involves considering factors such as posture, lighting, equipment placement, and user interaction to optimize productivity and prevent musculoskeletal injuries.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 04, 2014
    Quiz Created by
    Jscansino
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.