1.
A virus is a self ___program (1 word)
A. 
B. 
C. 
D. 
2.
Computer and network security help to keep data and equipment
A. 
Functioning and provide access only to appropriate people.
B. 
Everyone in an organization
C. 
Everyone who want's to take a look
D. 
3.
Theft, loss, network intrusion, and physical damage are some of the ways a network or computer can be harmed.
4.
To successfully protect computers and the network, a technician must understand both types of threats to computer security: Physical – Events or attacks that remove, corrupt, deny access, allow access, or steal information
5.
To successfully protect computers and the network, a technician must understand both types of threats to computer security: Data – Events or attacks that steal, damage, or destroy equipment, such as servers, switches, and wiring
6.
A worm is a self-replicating program that is harmful to (1 word)
7.
A Trojan is technically a worm. The Trojan does not need to be attached to other ___ Instead, a Trojan threat is hidden in ____ that appears to do one thing, and yet behind the scenes it does another.
8.
Attacks that stop a user using programs are called ___ (3 word's or abreviacion)
9.
Spoofing – Gains access to resources on devices by pretending to be a trusted computer
10.
DNS poisoning – Changes the DNS records on a system to point to True servers where the data is protected
11.
DDoS – Uses "(one word)" to make tracing the origin of the DoS attack difficult to locate
12.
Hardware destruction is the process of removing sensitive data from hardware and software before recycling or discarding. Hard drives should be fully erased to prevent the possibility of recovery using specialized software. Three methods are commonly used to either destroy or recycle data and hard drives:
A. 
B. 
C. 
D. 
E. 
13.
There are several methods of physically protecting computer equipment,(pick 3)
A. 
Control access to facilities
B. 
Fit equipment with security screws.
C. 
D. 
Install physical alarms triggered by motion-detection sensors
E. 
14.
Passwords should contain
A. 
A mixture of letters and numbers so that they cannot easily be broken.
B. 
A mixture of letters so that they cannot easily be broken.
C. 
A mixture of numbers so that they cannot easily be broken.
15.
A smart card is a small plastic card, about the size of a credit card, with a small __ embedded in it.
16.
Frequency of backups – Backups can take a long time. Sometimes it is easier to make a full backup yearly or and then do frequent partial backups of any data that has changed since the last yearly full backup
17.
(WEP) stand's for
18.
Computer technicians must be able to analyze a security threat and determine the appropriate method to protect assets and repair damage. This process is called
19.
Viruses and worms are common threats that attack
20.
Security threats can come from___ or ____of an organization.