Toughest Computer Networking: Quiz!

100 Questions | Total Attempts: 240

SettingsSettingsSettings
Please wait...
Toughest Computer Networking: Quiz!

.


Questions and Answers
  • 1. 
    ____ provides Internet access and have many members-only features that offer a variety of special content and services.
    • A. 

      ISPs

    • B. 

      LANs

    • C. 

      OSPs

    • D. 

      Networks

  • 2. 
    ___ provides wireless Internet access to users with wireless modems or Web-enabled handheld computers or devices.
    • A. 

      ISPs

    • B. 

      WSPs

    • C. 

      OSPs

    • D. 

      WANs

  • 3. 
    The domain name in the URL http://www.scsite.com/dc2003/ch2 is ____.
    • A. 

      Http://

    • B. 

      Www.scsite.com/

    • C. 

      Dc2002/

    • D. 

      Ch2

  • 4. 
    ____ program reads pages on Web sites in order to create an index of hits.
    • A. 

      Engine

    • B. 

      Directory

    • C. 

      Catalog

    • D. 

      Crawler

  • 5. 
    Web pages that list as the result of a search are called ____.
    • A. 

      Finds

    • B. 

      Spiders

    • C. 

      Hits

    • D. 

      Keywords

  • 6. 
    A built-in connection to another related Web page or part of a Web page is called a ____.
    • A. 

      Browser

    • B. 

      Hit

    • C. 

      Hyperlink

    • D. 

      Jump

  • 7. 
    When you want to transfer files between computers, the best Internet service to use is
    • A. 

      Instant Messaging

    • B. 

      FTP

    • C. 

      Chat

    • D. 

      Usenet

  • 8. 
    In networking, bandwidth refers to
    • A. 

      The speed at which a modem can operate

    • B. 

      The storage capacity of your email account

    • C. 

      The protocols used for Internet information

    • D. 

      The carrying capacity of the transmission media for sending information

  • 9. 
    If you want to connect your home computer so that you can view your school's website, in addition to your computer and modem you will need
    • A. 

      DSL, a browser, and the correct protocols

    • B. 

      An ISDN line, Windows, and an ISP

    • C. 

      Both an ISDN and DSL line and a browser.

    • D. 

      An ISP, browser, and your school's URL

  • 10. 
    Listservers are useful in helping teachers keep up with new ideas by:
    • A. 

      Allowing real-time, live chats between subscribers

    • B. 

      Listing new services on a community bulletin board

    • C. 

      Automatically sending information to your email box

    • D. 

      None of the above

  • 11. 
    What is the name for a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document?
    • A. 

      Spyware

    • B. 

      Virus

    • C. 

      Firewall

    • D. 

      Trojan Horse

  • 12. 
    What do you call a program used to detect unsolicited and unwanted e-mail and prevents those messages from getting to a user's inbox?
    • A. 

      Anti-spammer

    • B. 

      Email guard

    • C. 

      Virus filter

    • D. 

      Spam filter

  • 13. 
    What type of attack relies on the trusting nature of employees and the art of deception?
    • A. 

      Social Engineering

    • B. 

      Fraud

    • C. 

      Phishing

    • D. 

      Dumpster Driving

  • 14. 
    What can a firewall protect against?
    • A. 

      Viruses

    • B. 

      Unauthenticated interactive logins from the outside world

    • C. 

      Fire

    • D. 

      Connecting to and from the outside world

  • 15. 
    Which of the following is an example of a strong password?
    • A. 

      Password

    • B. 

      J*p2le04>F

    • C. 

      Your real name, user name, or company name

    • D. 

      Your birthdate

  • 16. 
    The majority of computer crimes are committed by:
    • A. 

      Hackers

    • B. 

      Insiders

    • C. 

      Overseas criminals

    • D. 

      Young teenage computer genius

  • 17. 
    The common name for the crime of stealing passwords is:
    • A. 

      Spooling

    • B. 

      Identity theft

    • C. 

      Spoofing

    • D. 

      Hacking

  • 18. 
    Collecting personal information and effectively posing as another individual is known as the crime of:
    • A. 

      Spooling

    • B. 

      Identity theft

    • C. 

      Spoofing

    • D. 

      Hacking

  • 19. 
    A program that performs a useful task while simultaneously allowing destructive acts is a:
    • A. 

      Worm

    • B. 

      Trojan Horse

    • C. 

      Virus

    • D. 

      Macro virus

  • 20. 
    An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:
    • A. 

      Trojan horse

    • B. 

      Virus

    • C. 

      Time-bomb

    • D. 

      Malware

  • 21. 
    What type of virus uses computer hosts to reproduce itself?
    • A. 

      Time bomb

    • B. 

      Worm

    • C. 

      Melissa Virus (I LOVE YOU VIRUS)

    • D. 

      Macro virus

  • 22. 
    What is the name of an application program that gathers user information and sends it to someone through the Internet?
    • A. 

      A Virus

    • B. 

      Spybot

    • C. 

      Logic Bomb

    • D. 

      Security patch

  • 23. 
    HTML viruses infect:
    • A. 

      Your computer

    • B. 

      A web page in HTML code

    • C. 

      Both a Web page and the computer that is viewing it

    • D. 

      None of the above

  • 24. 
    When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as:
    • A. 

      Viruses

    • B. 

      Trojan Horse

    • C. 

      Cracking

    • D. 

      A denial of service attack

  • 25. 
    ___ is the measurement of things such as fingerprints and retinal scans used for security access.
    • A. 

      Biometrics

    • B. 

      Biomeasurement

    • C. 

      Computer Security

    • D. 

      Smart weapon machinery

Back to Top Back to top