1.In a survey
of more than 500 companies and government agencies, ____________ percent
detected computer security breaches.
A. 20
B. 75
C. 85
D. 99
Answer: C
2.The survey
showed that these businesses lost more than ____________ due to security
breaches.
A. $100,000 each
B. $377 million
C. five employees each
D. $1 million
Answer: B
3.The typical
computer criminal is a(n):
A. young hacker.
B. trusted employee with no criminal record.
C. trusted employee with a long, but unknown criminal
record.
D. overseas young cracker.
Answer: B
4.The majority of computer crimes are committed by:
A. hackers.
B. insiders.
C. overseas
criminals.
D. young
teenage computer geniuses.
Answer: B
5. The common name for the crime of stealing passwords is:
A. spooling.
B. identity
theft.
C. spoofing.
D. hacking.
Answer: C
Reference: Theft by Computer
6. Collecting personal information and effectively posing as
another individual is known as the
crime of:
A. spooling.
B. identity theft.
C. spoofing.
D. hacking.
Answer: B
7. Malicious
software is known as:
A. badware.
B. malware.
C.
maliciousware.
D.
illegalware.
Answer: B
8. A program
that performs a useful task while simultaneously allowing destructive acts is
a:
A. worm.
B. Trojan
horse.
C. virus.
D. macro
virus.
Answer: B
Moderate
9. An
intentionally disruptive program that spreads from program to program or from
disk to disk is known as a:
A. Trojan
horse.
B. virus.
C. time
bomb.
D. time-related
bomb sequence.
Answer: B
10. In 1999, the
Melissa virus was a widely publicized:
A. e-mail
virus.
B. macro
virus.
C. Trojan
horse.
D. Time
bomb.
Answer: A
11. What type of
virus uses computer hosts to reproduce itself?
A. Time
bomb
B. Worm
C. Melissa
virus
D. Macro
virus
Answer: B
12. The thing
that eventually terminates a worm virus is a lack of:
A. memory
or disk space.
B. time.
C. CD
drive space.
D. CD-RW.
Answer: A
13. When a logic
bomb is activated by a time-related event, it is known as a:
A.
time-related bomb sequence.
B. virus.
C. time
bomb.
D. Trojan
horse.
Answer: C
14. A logic
bomb that was created to erupt on Michelangelo’s birthday is an example of a:
A.
time-related bomb sequence.
B. virus.
C. time
bomb.
D. Trojan
horse.
Answer: C
15. What is
the name of an application program that gathers user information and sends it
to someone through the Internet?
A. A
virus
B.
Spybot
C. Logic
bomb
D.
Security patch
Answer: B
16.
Standardization of Microsoft programs and the Windows operating system has made
the spread of viruses:
A. more complicated.
B. more
difficult.
C.
easier.
D.
slower.
Answer:
C
17. HTML
viruses infect:
A. your
computer.
B. a Web
page in the HTML code.
C. both a Web page and the computer
that is viewing it.
D. No
Answer:B
18. Software
programs that close potential security breaches in an operating system are
known as:
A.
security breach fixes.
B. refresh patches.
C.
security repairs.
D.
security patches.
Answer: D
19. When
customers of a Web site are unable to access it due to a bombardment of fake
traffic, it is known as:
A. a
virus.
B. a
Trojan horse.
C.
cracking.
D. a
denial of service attack.
Answer: D
20. ___________
is the measurement of things such as fingerprints and retinal scans used for
security access.
A.
Biometrics
B.
Biomeasurement
C. Computer
security
D. Smart
weapon machinery
Answer: A