Advertisement
Guest User

Untitled

a guest
Dec 11th, 2018
995
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 10.84 KB | None | 0 0
  1. Question 1
  2. 2 out of 2 points
  3.  
  4. A ________ appears to be a legitimate program, but is actually something malicious.
  5. Selected Answer:
  6. Correct Trojan horse
  7. Answers:
  8. Correct Trojan horse
  9. rootkit
  10. botnet
  11. worm
  12. Question 2
  13. 2 out of 2 points
  14.  
  15. A service pack is a large, planned software update that addresses multiple problems or adds multiple features.
  16. Selected Answer:
  17. Correct True
  18. Answers:
  19. Correct True
  20. False
  21. Question 3
  22. 2 out of 2 points
  23.  
  24. Which device on a network performs network address translation?
  25. Selected Answer:
  26. Correct Router
  27. Answers:
  28. Repeater
  29. Correct Router
  30. Hub
  31. Splitter
  32. Question 4
  33. 2 out of 2 points
  34.  
  35. You should use a(n) ________ account for everyday computing on a computer running Windows.
  36. Selected Answer:
  37. Correct standard
  38. Answers:
  39. guest
  40. Correct standard
  41. visitor
  42. administrator
  43. Question 5
  44. 2 out of 2 points
  45.  
  46. Phishing and pharming attempts are successful because they appear to be from legitimate websites.
  47. Selected Answer:
  48. Correct True
  49. Answers:
  50. Correct True
  51. False
  52. Question 6
  53. 2 out of 2 points
  54.  
  55. A ________ changes your home page and redirects you to other websites.
  56. Selected Answer:
  57. Correct browser hijacker
  58. Answers:
  59. botnet
  60. Correct browser hijacker
  61. zombie
  62. rootkit
  63. Question 7
  64. 2 out of 2 points
  65.  
  66. A ________ connects two or more networks together.
  67. Selected Answer:
  68. Correct router
  69. Answers:
  70. switch
  71. Correct router
  72. repeater
  73. hub
  74. Question 8
  75. 2 out of 2 points
  76.  
  77. A criminal might obtain personal information by capturing what is typed on a keyboard by installing a keylogger program
  78. Selected Answer:
  79. Correct True
  80. Answers:
  81. Correct True
  82. False
  83. Question 9
  84. 2 out of 2 points
  85.  
  86. The cyberbullying of one adult by another adult, using a computer is known as ________.
  87. Selected Answer:
  88. Correct cyber-harassment
  89. Answers:
  90. Correct cyber-harassment
  91. phishing
  92. stalking
  93. pharming
  94. Question 10
  95. 2 out of 2 points
  96.  
  97. Cyber criminals can be difficult to catch because many of the attacks originate outside the United States.
  98. Selected Answer:
  99. Correct True
  100. Answers:
  101. Correct True
  102. False
  103. Question 11
  104. 2 out of 2 points
  105.  
  106. When you set up your wireless router, you should change the ________, which is also called the wireless network name.
  107. Selected Answer:
  108. Correct SSID
  109. Answers:
  110. Correct SSID
  111. WAP
  112. NAT
  113. WEP
  114. Question 12
  115. 2 out of 2 points
  116.  
  117. An email supposedly from your bank asking for your password so that it can troubleshoot your account is a form of ________.
  118. Selected Answer:
  119. Correct phishing
  120. Answers:
  121. pharming
  122. cyberbullying
  123. Correct phishing
  124. cyber-stalking
  125. Question 13
  126. 2 out of 2 points
  127.  
  128. When a company pays people to hack into its own system, it calls in ________ hackers.
  129. Selected Answer:
  130. Correct white-hat
  131. Answers:
  132. Correct white-hat
  133. gray-hat
  134. green-hat
  135. black-hat
  136. Question 14
  137. 2 out of 2 points
  138.  
  139. If your computer has a ________, someone else can gain access to it undetected.
  140. Selected Answer:
  141. Correct rootkit
  142. Answers:
  143. zombie
  144. logic bomb
  145. botnet
  146. Correct rootkit
  147. Question 15
  148. 2 out of 2 points
  149.  
  150. ________ is an unlawful attack on computers or networks done to intimidate a government or its people.
  151. Selected Answer:
  152. Correct Cyber-terrorism
  153. Answers:
  154. Correct Cyber-terrorism
  155. Cyber-stalking
  156. Cybercrime
  157. Computer fraud
  158. Question 16
  159. 2 out of 2 points
  160.  
  161. An email claiming that you have won a lottery might be an example of ________.
  162. Selected Answer:
  163. Correct computer fraud
  164. Answers:
  165. cyber-harassment
  166. Correct computer fraud
  167. cyber-stalking
  168. cyberbullying
  169. Question 17
  170. 2 out of 2 points
  171.  
  172. When you enter your credit card information in a website, you know the website is encrypted when you see ________ in the address bar.
  173. Selected Answer:
  174. Correct https
  175. Answers:
  176. http
  177. Correct https
  178. shttp
  179. ssl
  180. Question 18
  181. 2 out of 2 points
  182.  
  183. Antivirus software uses ________ to search for known viruses.
  184. Selected Answer:
  185. Correct signature checking
  186. Answers:
  187. virus checks
  188. definition date checks
  189. stop-and-search checks
  190. Correct signature checking
  191. Question 19
  192. 2 out of 2 points
  193.  
  194. In an office acceptable use policy (AUP), which of the following might be prohibited?
  195. Selected Answer:
  196. Correct Logging in to eBay
  197. Answers:
  198. Viewing an associate's electronic calendar
  199. Checking work email
  200. Correct Logging in to eBay
  201. Purchasing business supplies online
  202. Question 20
  203. 2 out of 2 points
  204.  
  205. Another name for a bot is a zombie.
  206. Selected Answer:
  207. Correct True
  208. Answers:
  209. Correct True
  210. False
  211. Question 21
  212. 2 out of 2 points
  213.  
  214. A router is a form of security because it ________.
  215. Selected Answer:
  216. Correct acts like a firewall
  217. Answers:
  218. scans your email for malicious content
  219. Correct acts like a firewall
  220. scans webpages before displaying the content
  221. implements User Account Control (UAC)
  222. Question 22
  223. 2 out of 2 points
  224.  
  225. Antispyware software prevents adware software from installing itself on your computer.
  226. Selected Answer:
  227. Correct True
  228. Answers:
  229. Correct True
  230. False
  231. Question 23
  232. 2 out of 2 points
  233.  
  234. Worms spread over network connections without any help from users.
  235. Selected Answer:
  236. Correct True
  237. Answers:
  238. Correct True
  239. False
  240. Question 24
  241. 2 out of 2 points
  242.  
  243. Cyber-harassment is defined as cyberbullying between adults.
  244. Selected Answer:
  245. Correct True
  246. Answers:
  247. Correct True
  248. False
  249. Question 25
  250. 2 out of 2 points
  251.  
  252. When using Windows to make changes, install hardware, or configure settings, you need to use the ________ account on your computer.
  253. Selected Answer:
  254. Correct administrator
  255. Answers:
  256. guest
  257. client
  258. Correct administrator
  259. master
  260. Question 26
  261. 2 out of 2 points
  262.  
  263. The biggest difference between cyberbullying and cyber-harassment is that one involves minors and the other occurs between adults.
  264. Selected Answer:
  265. Correct True
  266. Answers:
  267. Correct True
  268. False
  269. Question 27
  270. 2 out of 2 points
  271.  
  272. Spyware is easy to remove from your computer.
  273. Selected Answer:
  274. Correct False
  275. Answers:
  276. True
  277. Correct False
  278. Question 28
  279. 2 out of 2 points
  280.  
  281. Adware does NOT affect your computer's performance.
  282. Selected Answer:
  283. Correct False
  284. Answers:
  285. True
  286. Correct False
  287. Question 29
  288. 2 out of 2 points
  289.  
  290. Which cybercrime is considered to be a form of harassment?
  291. Selected Answer:
  292. Correct Cyber-stalking
  293. Answers:
  294. Phishing
  295. Pharming
  296. Clickjacking
  297. Correct Cyber-stalking
  298. Question 30
  299. 2 out of 2 points
  300.  
  301. The only authority responsible for investigating cybercrime in the United States is the FBI.
  302. Selected Answer:
  303. Correct False
  304. Answers:
  305. True
  306. Correct False
  307. Question 31
  308. 2 out of 2 points
  309.  
  310. Cyber-stalking is serious because the person demonstrates a pattern of harassment and poses a credible threat of harm.
  311. Selected Answer:
  312. Correct True
  313. Answers:
  314. Correct True
  315. False
  316. Question 32
  317. 2 out of 2 points
  318.  
  319. Another name for the actual attack caused by a virus is a ________.
  320. Selected Answer:
  321. Correct payload
  322. Answers:
  323. Correct payload
  324. hoax
  325. logic bomb
  326. worm
  327. Question 33
  328. 2 out of 2 points
  329.  
  330. A rootkit is a set of programs that enables someone to gain control over a computer system surreptitiously.
  331. Selected Answer:
  332. Correct True
  333. Answers:
  334. Correct True
  335. False
  336. Question 34
  337. 2 out of 2 points
  338.  
  339. The only program you need to fully protect your computer is a good antivirus program.
  340. Selected Answer:
  341. Correct False
  342. Answers:
  343. True
  344. Correct False
  345. Question 35
  346. 2 out of 2 points
  347.  
  348. The difference between a virus and a worm is a ________.
  349. Selected Answer:
  350. Correct virus needs a host file, but a worm does not
  351. Answers:
  352. virus is a threat to your computer, but a worm is not
  353. worm is a threat to your computer, but a virus is not
  354. Correct virus needs a host file, but a worm does not
  355. virus replicates itself, but a worm cannot self-replicate
  356. Question 36
  357. 2 out of 2 points
  358.  
  359. Hacking to make a political statement is called ________.
  360. Selected Answer:
  361. Correct hacktivism
  362. Answers:
  363. sneaking
  364. politicking
  365. Correct hacktivism
  366. cracking
  367. Question 37
  368. 2 out of 2 points
  369.  
  370. A black-hat hacker attempts to find security holes in a system to prevent future hacking.
  371. Selected Answer:
  372. Correct False
  373. Answers:
  374. True
  375. Correct False
  376. Question 38
  377. 2 out of 2 points
  378.  
  379. To secure your wireless network at home, you should ________.
  380. Selected Answer:
  381. Correct use wireless encryption with a difficult passphrase
  382. Answers:
  383. password-protect important document files
  384. back up the computers on the network
  385. Correct use wireless encryption with a difficult passphrase
  386. set the SSID to CLOSED
  387. Question 39
  388. 2 out of 2 points
  389.  
  390. Ransomware is malware that prevents you from using your computer until you pay a fine or fee.
  391. Selected Answer:
  392. Correct True
  393. Answers:
  394. Correct True
  395. False
  396. Question 40
  397. 2 out of 2 points
  398.  
  399. Firewalls can be implemented by hardware and/or software.
  400. Selected Answer:
  401. Correct True
  402. Answers:
  403. Correct True
  404. False
  405. Question 41
  406. 2 out of 2 points
  407.  
  408. A hotfix resolves individual software problems as they are discovered.
  409. Selected Answer:
  410. Correct True
  411. Answers:
  412. Correct True
  413. False
  414. Question 42
  415. 2 out of 2 points
  416.  
  417. Which statement about a logic bomb is FALSE?
  418. Selected Answer:
  419. Correct It can spread to other machines.
  420. Answers:
  421. It can lay dormant until specific conditions are met.
  422. It is often planted by a disgruntled IT worker,
  423. It can be triggered on a specific date.
  424. Correct It can spread to other machines.
  425. Question 43
  426. 2 out of 2 points
  427.  
  428. Once a computer is infected, a virus can use an email program to send out copies of itself.
  429. Selected Answer:
  430. Correct True
  431. Answers:
  432. Correct True
  433. False
  434. Question 44
  435. 2 out of 2 points
  436.  
  437. Which would be the strongest password?
  438. Selected Answer:
  439. Correct p@55W0?d
  440. Answers:
  441. p22w0r6
  442. Correct p@55W0?d
  443. p@ssw*rd
  444. customer
  445. Question 45
  446. 2 out of 2 points
  447.  
  448. The ________ Act passed by the U.S. Congress in 1986 made it a crime to access classified information.
  449. Selected Answer:
  450. Correct Computer Fraud and Abuse
  451. Answers:
  452. Cybersecurity
  453. USA PATRIOT
  454. Correct Computer Fraud and Abuse
  455. Cyber Security Enhancement
  456. Question 46
  457. 2 out of 2 points
  458.  
  459. ________ redirects you to a phony website by hijacking a domain name.
  460. Selected Answer:
  461. Correct Pharming
  462. Answers:
  463. Clickjacking
  464. Shill bidding
  465. Correct Pharming
  466. Phishing
  467. Question 47
  468. 2 out of 2 points
  469.  
  470. ________ hackers hack into systems to steal or vandalize.
  471. Selected Answer:
  472. Correct Black-hat
  473. Answers:
  474. White-hat
  475. Gray-hat
  476. Correct Black-hat
  477. Red-hat
  478. Question 48
  479. 2 out of 2 points
  480.  
  481. Encryption converts plain text into ciphertext.
  482. Selected Answer:
  483. Correct True
  484. Answers:
  485. Correct True
  486. False
  487. Question 49
  488. 2 out of 2 points
  489.  
  490. The ________ was created to make it easier for victims to report cybercrimes.
  491. Selected Answer:
  492. Correct Internet Crime Complaint Center
  493. Answers:
  494. USA PATRIOT Act
  495. Homeland Security Act
  496. Computer Fraud and Abuse Act
  497. Correct Internet Crime Complaint Center
  498. Question 50
  499. 2 out of 2 points
  500.  
  501. Which statement about cookies is FALSE?
  502. Selected Answer:
  503. Correct They cannot collect information you do not want to share.
  504. Answers:
  505. They can be installed without your knowledge.
  506. Correct They cannot collect information you do not want to share.
  507. They are used by websites to identify you.
  508. They are small text files.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement