Вы находитесь на странице: 1из 5

ITB-SESN-2-POST CLASS

ore 0.00 of 1

1. Programs that come into a computer system disguised as something else are called:

Spoofers

Loggers
Defacers
Trojan horses

Score 0.00 of 1

2. An attempt to slow down or stop a computer system or network by flooding the system with requests for information is
called:

Virus

Worm
Denial-of-service attack

Trojan horse
Score 1.00 of 1

3. The acronym DoS, when it refers to a computer attack, is:

Denial-of-service attack

Destruction-of-service attack
Depository-of-service attack

Designed-service-attack
Score 0.00 of 1

4. A fraudulent or deceptive act or operation designed to trick individuals into spending their time and money for little or
no return is called:

Annoyance

Worm
Attack
Scam

Score 1.00 of 1

5. Theft can take many forms of hardware, of software, of data, of computer time. White-collar computer crime
involves the theft of:

Applications
Spikes
Data

Property
Score 0.00 of 1

6. Which of the following would best fit the following description software is copied and given to a friend without the
permission of the owner?

Freeware

Piracy

Shareware

Public domain
Score 1.00 of 1

7. When a hard disk crashes, it is an example of a __________ type of computer security threat.

natural hazard
criminal
technological failure

civil strife
Score 0.00 of 1

8. A device that protects against a sudden increase in electrical power is a/an:

Anti-spiker
Voltage regulator

Electrical manipulator
Surge protector

Score 0.00 of 1

9. One of the more common types of technological failures is when your computer experiences too much
electricity. This is known as a/an:

Protector
Brownout

Voltage surge

Energizing
Score 1.00 of 1

10. __________ is the process of protecting information, hardware, and software from unauthorized use as well
as from damage from intrusions, sabotage, and natural disasters.

Protector
Security

Antivirus
Drivers
Score 1.00 of 1

11. A __________ acts as a security buffer between a companys private network and all external networks.

firewall

password
disaster recovery plan
virus checker
Score 0.00 of 1

12. A __________ can help to avoid loss of information and data and protect computer systems from access
by unauthorized persons.

firewall
password

disaster recovery plan


backup files
Score 0.00 of 1

13. Special emergency facilities that are fully equipped backup computer centers, including hardware and
software, are:

Cold sites
Backups

Hot sites

Reinforcements
Score 0.00 of 1

14. If an off-location site is available for backing up data and systems, but requires hardware to be installed,
this site is known as __________.

hot sites

backups
reinforcements
cold sites

Score 0.00 of 1

15. One of the safest procedures to protect software and data is to include __________.

screening of applicants to be sure they have no previous records


guarding of passwords and frequently changing them

making frequent backups of data and storing in remote locations

auditing of data and programs once a year

Вам также может понравиться