1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside
2- A (system failure) is the prolonged malfunction of a computer
3- A (worm) is a program that copies itself repeatedly in memory or on a network, using up resources and possibly shutting down the computer or network
4-A (VPN) provides the mobile user with a secure connection to the company network server 5- (Audit control) software monitors and records computer activity
6- A computer (security risk) is an event, action, or situation that can lead to the loss or destruction of computer systems or their data
7- An internet (denial of service) attack occurs when an internet server is purposely overloaded so that it cannot process legitimate transmissions
8- A (uninterruptible power supply) can protect computers from data loss during power failures 9- A (worm) is a program that does NOT have to be executed in order to propagate over a network 10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
11- A (surge protector) shield electronic equipment from power spikes
12- A computer (virus) is a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission 13- A person breaking into a computer laboratory and smashing computers is an example of (hardware vandalism)
14- A destructive program that remains on a computer system until the occurrence of special event or time is called a (Time bomb)
15- A (surge protector) uses special electrical components to provide a stable current flow to the computer and other electronic equipment
16- (Antivirus programs) are designed to search for viruses, notify users when they’re found, and remove them from infected disks or files
17- A (digital signature) is an encrypted code that a person, website, or organization attaches to an electronic message to verify the identity the sender
18- A (cracker) is someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action
19- A (Trojan horse) is a malicious – logic program that hides within or looks a legitimate program and usually is triggered by a certain condition or action
20- A (cyber terrorist) is someone who uses the internet to destroy or damage computers for political reasons
21- Another name for a time bomb is a (logic) bomb
22- A (rootkit) is a program that hides in a computer and allows someone from a remote location to take full control of the computer
23- A (uninterruptible power supply) is a battery-powers piece of equipment that provides backup power to a computer for a limited time
24- A (cyberextortionist) is someone who uses e-mail as a vehicle for extortion 25- Breaking into other computer system is called (Electronic trespassing)
26- (Corporate spies) are hired to break into a specific computer and steal its proprietary data 27- Crimes that use the internet are called (cybercrimes)
28- Code hidden within a program that damages or destroys files is called a computer (virus) 29- (Denial of service (dos)) attacks bombard servers and web sites with traffic that shuts down networks
30- (Employee monitoring) allows an employer to observe employee phone calls, e-mails, and Web browsing
31-(encryption) is the process of converting readable data into unreadable characters to prevent unauthorized access
32- Firewalls are used to (restrict outsiders from accessing internal data)
33- (Information theft) occurs when someone steals personal or confidential information
34- In which type of attack does the attacker poses as a legitimate company in an e-mail or website (phishing)
35- Malicious software is known as (malware)
36- Many web sites require a user to enter a (username), which is a unique combination of characters, such as letters of alphabet or numbers that identifies one specific user
37- of the currently employed access control methods, (biometric authentication) is the most secure, because it involves identification of the user’s body, such as his or her eyes or fingerprints
38- (Spoofing) is a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network
39- (Spyware) is technology that collects information from computer users without their knowledge or consent
40- (Software theft) occurs when someone steals software media, intestinally erase programs, or illegally copies a program
41- The scrambling of code is known as (encryption) 42- The term malware is short for (malicious software)
43-The ability to convey a message without disclosing your name or identity is known as (anonymity) 44- To safeguard your equipment and data against power-related issues, you should always use a (surge protector)
45-This type of software collects your personal information, monitors your web surfing habits and distributes this information to a third party (spyware)
46-The ability to convey a message without disclosing your name or identity is known as (anonymity) 47- Using a technique known as (IP spoofing) a message is sent to a computer system using an IP address disguised as one from a trusted source
48- (Unethical employees) break into their employer’s computers for a variety of reasons to exploit a security weakness, to seek financial gain from selling confidential information, on to take revenge 49- What do you call a piece of code that attaches to an applications program and secretly spreads when the application program is executes (Virus)
50- What do you call a program that secretly records information about a computer user’s activities and sends it out over the internet (Spybot)
51- What do you call a person who access a computer without authorization (Hacker)
52- What do you call a program that perform a useful task while at the same time carrying out some secret destructive act (Trojan horse)
53- What is the best definition of a computer hacker (A hacker is a person who investigates a computer system to understand both its full capabilities and vulnerabilities)
54- What do you call a program that has the ability to execute independently and spread over a computer network? (Worm)
55- Which of the following best describes web bug (a component of a web page that tracks and collects information about visitors)
56- What is the study of converting information into encoded or scrambled formats called (Cryptography)
57- Which type of rogue program is disguised as a useful program but contains hidden instructions to perform a malicious task (Trojan horse)
58- Which of the following best describes a web bug (A component of a web page that tracks and collects information about visitors)
59- Which of the following passwords provides the most secure choice (3R2Wvx8@)
60- What is the best definition of a cookie (It is a plain-text file written to your hard disk by a web site you visit)
61- Which of the following groups of people present the greatest threat to a company’s information structure (Company insiders)
62- Which of the following is true of cookies (They help companies track browsing habits and preferences of users)
63- Which of the following NOT a technique you can effectively use to reduce the amount of unauthorized email on your computer (Reply to spam and ask to be removed from the mailing list) 64- A script kiddie has the same intent as a cracker but does not have the technical skills and knowledge
1- A DOS attack is a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network (×)
2- A message that has been coded with an encryption key is referred to as encrypto – text (×) 3- A digital signature guarantees that a message has not been tampered with (√)
4- A cyberextortionist is someone who uses the internet or a network to destroy or damage computers (×)
5- All new cell phones have GPS awareness (√)
6- Before it is encrypted, a readable message is known as ciphertext (×) 7- Computer forensics is a form of computer crime (×)
8- Computer crime often goes unreported because businesses fear negative publicity (√)
9- In general, computer viruses don’t discriminate among operating systems; a typical virus can infect any system, regardless of platform(×)
10- Information can be recovered from a hard drive even after file have been deleted
(√)
11- IP spoofing takes place when hacker sends a message with an IP address disguised as an incoming message
(√)
12- Malware includes spyware, computer viruses and various rogue programs
(√)
13- Organized crime and terrorist organizations aren’t likely to commit computer crimes because they don’t have the expertise
(×)
14- Private Key encryption is considered essential for e-commerce
(×)
15- Personal firewalls are programs of devices that protect home computers from unauthorized access
(√)
16-Privacy and computer crime are the same
(×)
17- Security procedures eliminate all risks to computers
(√)
18- Smart cards and biometrics are two ways companies may add physical security to computer systems
(√)
18- Spam is a program placed on a computer without the user
(×)
19- Stealing the key used for encryption is called key intermediation (×)
20- The next major war will probably involve some kind of cyber-attacks
(√)
21- The majority of computer crimes are committed by hackers and vandals with no ties to the victim companies (×)
22- The most widely used data recovery technique is making regular backups
(√)
23- Wireless access poses additional security risks(√)
24- When you browse from site to site, the cookie that has been loaded onto the computer’s hard drive is not detected, read and matched with previous browsing activity