Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Question 1
- 2 out of 2 points
- A ________ appears to be a legitimate program, but is actually something malicious.
- Selected Answer:
- Correct Trojan horse
- Answers:
- Correct Trojan horse
- rootkit
- botnet
- worm
- Question 2
- 2 out of 2 points
- A service pack is a large, planned software update that addresses multiple problems or adds multiple features.
- Selected Answer:
- Correct True
- Answers:
- Correct True
- False
- Question 3
- 2 out of 2 points
- Which device on a network performs network address translation?
- Selected Answer:
- Correct Router
- Answers:
- Repeater
- Correct Router
- Hub
- Splitter
- Question 4
- 2 out of 2 points
- You should use a(n) ________ account for everyday computing on a computer running Windows.
- Selected Answer:
- Correct standard
- Answers:
- guest
- Correct standard
- visitor
- administrator
- Question 5
- 2 out of 2 points
- Phishing and pharming attempts are successful because they appear to be from legitimate websites.
- Selected Answer:
- Correct True
- Answers:
- Correct True
- False
- Question 6
- 2 out of 2 points
- A ________ changes your home page and redirects you to other websites.
- Selected Answer:
- Correct browser hijacker
- Answers:
- botnet
- Correct browser hijacker
- zombie
- rootkit
- Question 7
- 2 out of 2 points
- A ________ connects two or more networks together.
- Selected Answer:
- Correct router
- Answers:
- switch
- Correct router
- repeater
- hub
- Question 8
- 2 out of 2 points
- A criminal might obtain personal information by capturing what is typed on a keyboard by installing a keylogger program
- Selected Answer:
- Correct True
- Answers:
- Correct True
- False
- Question 9
- 2 out of 2 points
- The cyberbullying of one adult by another adult, using a computer is known as ________.
- Selected Answer:
- Correct cyber-harassment
- Answers:
- Correct cyber-harassment
- phishing
- stalking
- pharming
- Question 10
- 2 out of 2 points
- Cyber criminals can be difficult to catch because many of the attacks originate outside the United States.
- Selected Answer:
- Correct True
- Answers:
- Correct True
- False
- Question 11
- 2 out of 2 points
- When you set up your wireless router, you should change the ________, which is also called the wireless network name.
- Selected Answer:
- Correct SSID
- Answers:
- Correct SSID
- WAP
- NAT
- WEP
- Question 12
- 2 out of 2 points
- An email supposedly from your bank asking for your password so that it can troubleshoot your account is a form of ________.
- Selected Answer:
- Correct phishing
- Answers:
- pharming
- cyberbullying
- Correct phishing
- cyber-stalking
- Question 13
- 2 out of 2 points
- When a company pays people to hack into its own system, it calls in ________ hackers.
- Selected Answer:
- Correct white-hat
- Answers:
- Correct white-hat
- gray-hat
- green-hat
- black-hat
- Question 14
- 2 out of 2 points
- If your computer has a ________, someone else can gain access to it undetected.
- Selected Answer:
- Correct rootkit
- Answers:
- zombie
- logic bomb
- botnet
- Correct rootkit
- Question 15
- 2 out of 2 points
- ________ is an unlawful attack on computers or networks done to intimidate a government or its people.
- Selected Answer:
- Correct Cyber-terrorism
- Answers:
- Correct Cyber-terrorism
- Cyber-stalking
- Cybercrime
- Computer fraud
- Question 16
- 2 out of 2 points
- An email claiming that you have won a lottery might be an example of ________.
- Selected Answer:
- Correct computer fraud
- Answers:
- cyber-harassment
- Correct computer fraud
- cyber-stalking
- cyberbullying
- Question 17
- 2 out of 2 points
- When you enter your credit card information in a website, you know the website is encrypted when you see ________ in the address bar.
- Selected Answer:
- Correct https
- Answers:
- http
- Correct https
- shttp
- ssl
- Question 18
- 2 out of 2 points
- Antivirus software uses ________ to search for known viruses.
- Selected Answer:
- Correct signature checking
- Answers:
- virus checks
- definition date checks
- stop-and-search checks
- Correct signature checking
- Question 19
- 2 out of 2 points
- In an office acceptable use policy (AUP), which of the following might be prohibited?
- Selected Answer:
- Correct Logging in to eBay
- Answers:
- Viewing an associate's electronic calendar
- Checking work email
- Correct Logging in to eBay
- Purchasing business supplies online
- Question 20
- 2 out of 2 points
- Another name for a bot is a zombie.
- Selected Answer:
- Correct True
- Answers:
- Correct True
- False
- Question 21
- 2 out of 2 points
- A router is a form of security because it ________.
- Selected Answer:
- Correct acts like a firewall
- Answers:
- scans your email for malicious content
- Correct acts like a firewall
- scans webpages before displaying the content
- implements User Account Control (UAC)
- Question 22
- 2 out of 2 points
- Antispyware software prevents adware software from installing itself on your computer.
- Selected Answer:
- Correct True
- Answers:
- Correct True
- False
- Question 23
- 2 out of 2 points
- Worms spread over network connections without any help from users.
- Selected Answer:
- Correct True
- Answers:
- Correct True
- False
- Question 24
- 2 out of 2 points
- Cyber-harassment is defined as cyberbullying between adults.
- Selected Answer:
- Correct True
- Answers:
- Correct True
- False
- Question 25
- 2 out of 2 points
- When using Windows to make changes, install hardware, or configure settings, you need to use the ________ account on your computer.
- Selected Answer:
- Correct administrator
- Answers:
- guest
- client
- Correct administrator
- master
- Question 26
- 2 out of 2 points
- The biggest difference between cyberbullying and cyber-harassment is that one involves minors and the other occurs between adults.
- Selected Answer:
- Correct True
- Answers:
- Correct True
- False
- Question 27
- 2 out of 2 points
- Spyware is easy to remove from your computer.
- Selected Answer:
- Correct False
- Answers:
- True
- Correct False
- Question 28
- 2 out of 2 points
- Adware does NOT affect your computer's performance.
- Selected Answer:
- Correct False
- Answers:
- True
- Correct False
- Question 29
- 2 out of 2 points
- Which cybercrime is considered to be a form of harassment?
- Selected Answer:
- Correct Cyber-stalking
- Answers:
- Phishing
- Pharming
- Clickjacking
- Correct Cyber-stalking
- Question 30
- 2 out of 2 points
- The only authority responsible for investigating cybercrime in the United States is the FBI.
- Selected Answer:
- Correct False
- Answers:
- True
- Correct False
- Question 31
- 2 out of 2 points
- Cyber-stalking is serious because the person demonstrates a pattern of harassment and poses a credible threat of harm.
- Selected Answer:
- Correct True
- Answers:
- Correct True
- False
- Question 32
- 2 out of 2 points
- Another name for the actual attack caused by a virus is a ________.
- Selected Answer:
- Correct payload
- Answers:
- Correct payload
- hoax
- logic bomb
- worm
- Question 33
- 2 out of 2 points
- A rootkit is a set of programs that enables someone to gain control over a computer system surreptitiously.
- Selected Answer:
- Correct True
- Answers:
- Correct True
- False
- Question 34
- 2 out of 2 points
- The only program you need to fully protect your computer is a good antivirus program.
- Selected Answer:
- Correct False
- Answers:
- True
- Correct False
- Question 35
- 2 out of 2 points
- The difference between a virus and a worm is a ________.
- Selected Answer:
- Correct virus needs a host file, but a worm does not
- Answers:
- virus is a threat to your computer, but a worm is not
- worm is a threat to your computer, but a virus is not
- Correct virus needs a host file, but a worm does not
- virus replicates itself, but a worm cannot self-replicate
- Question 36
- 2 out of 2 points
- Hacking to make a political statement is called ________.
- Selected Answer:
- Correct hacktivism
- Answers:
- sneaking
- politicking
- Correct hacktivism
- cracking
- Question 37
- 2 out of 2 points
- A black-hat hacker attempts to find security holes in a system to prevent future hacking.
- Selected Answer:
- Correct False
- Answers:
- True
- Correct False
- Question 38
- 2 out of 2 points
- To secure your wireless network at home, you should ________.
- Selected Answer:
- Correct use wireless encryption with a difficult passphrase
- Answers:
- password-protect important document files
- back up the computers on the network
- Correct use wireless encryption with a difficult passphrase
- set the SSID to CLOSED
- Question 39
- 2 out of 2 points
- Ransomware is malware that prevents you from using your computer until you pay a fine or fee.
- Selected Answer:
- Correct True
- Answers:
- Correct True
- False
- Question 40
- 2 out of 2 points
- Firewalls can be implemented by hardware and/or software.
- Selected Answer:
- Correct True
- Answers:
- Correct True
- False
- Question 41
- 2 out of 2 points
- A hotfix resolves individual software problems as they are discovered.
- Selected Answer:
- Correct True
- Answers:
- Correct True
- False
- Question 42
- 2 out of 2 points
- Which statement about a logic bomb is FALSE?
- Selected Answer:
- Correct It can spread to other machines.
- Answers:
- It can lay dormant until specific conditions are met.
- It is often planted by a disgruntled IT worker,
- It can be triggered on a specific date.
- Correct It can spread to other machines.
- Question 43
- 2 out of 2 points
- Once a computer is infected, a virus can use an email program to send out copies of itself.
- Selected Answer:
- Correct True
- Answers:
- Correct True
- False
- Question 44
- 2 out of 2 points
- Which would be the strongest password?
- Selected Answer:
- Correct p@55W0?d
- Answers:
- p22w0r6
- Correct p@55W0?d
- p@ssw*rd
- customer
- Question 45
- 2 out of 2 points
- The ________ Act passed by the U.S. Congress in 1986 made it a crime to access classified information.
- Selected Answer:
- Correct Computer Fraud and Abuse
- Answers:
- Cybersecurity
- USA PATRIOT
- Correct Computer Fraud and Abuse
- Cyber Security Enhancement
- Question 46
- 2 out of 2 points
- ________ redirects you to a phony website by hijacking a domain name.
- Selected Answer:
- Correct Pharming
- Answers:
- Clickjacking
- Shill bidding
- Correct Pharming
- Phishing
- Question 47
- 2 out of 2 points
- ________ hackers hack into systems to steal or vandalize.
- Selected Answer:
- Correct Black-hat
- Answers:
- White-hat
- Gray-hat
- Correct Black-hat
- Red-hat
- Question 48
- 2 out of 2 points
- Encryption converts plain text into ciphertext.
- Selected Answer:
- Correct True
- Answers:
- Correct True
- False
- Question 49
- 2 out of 2 points
- The ________ was created to make it easier for victims to report cybercrimes.
- Selected Answer:
- Correct Internet Crime Complaint Center
- Answers:
- USA PATRIOT Act
- Homeland Security Act
- Computer Fraud and Abuse Act
- Correct Internet Crime Complaint Center
- Question 50
- 2 out of 2 points
- Which statement about cookies is FALSE?
- Selected Answer:
- Correct They cannot collect information you do not want to share.
- Answers:
- They can be installed without your knowledge.
- Correct They cannot collect information you do not want to share.
- They are used by websites to identify you.
- They are small text files.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement