Академический Документы
Профессиональный Документы
Культура Документы
ore 0.00 of 1
1. Programs that come into a computer system disguised as something else are called:
Spoofers
Loggers
Defacers
Trojan horses
Score 0.00 of 1
2. An attempt to slow down or stop a computer system or network by flooding the system with requests for information is
called:
Virus
Worm
Denial-of-service attack
Trojan horse
Score 1.00 of 1
Denial-of-service attack
Destruction-of-service attack
Depository-of-service attack
Designed-service-attack
Score 0.00 of 1
4. A fraudulent or deceptive act or operation designed to trick individuals into spending their time and money for little or
no return is called:
Annoyance
Worm
Attack
Scam
Score 1.00 of 1
5. Theft can take many forms of hardware, of software, of data, of computer time. White-collar computer crime
involves the theft of:
Applications
Spikes
Data
Property
Score 0.00 of 1
6. Which of the following would best fit the following description software is copied and given to a friend without the
permission of the owner?
Freeware
Piracy
Shareware
Public domain
Score 1.00 of 1
7. When a hard disk crashes, it is an example of a __________ type of computer security threat.
natural hazard
criminal
technological failure
civil strife
Score 0.00 of 1
Anti-spiker
Voltage regulator
Electrical manipulator
Surge protector
Score 0.00 of 1
9. One of the more common types of technological failures is when your computer experiences too much
electricity. This is known as a/an:
Protector
Brownout
Voltage surge
Energizing
Score 1.00 of 1
10. __________ is the process of protecting information, hardware, and software from unauthorized use as well
as from damage from intrusions, sabotage, and natural disasters.
Protector
Security
Antivirus
Drivers
Score 1.00 of 1
11. A __________ acts as a security buffer between a companys private network and all external networks.
firewall
password
disaster recovery plan
virus checker
Score 0.00 of 1
12. A __________ can help to avoid loss of information and data and protect computer systems from access
by unauthorized persons.
firewall
password
13. Special emergency facilities that are fully equipped backup computer centers, including hardware and
software, are:
Cold sites
Backups
Hot sites
Reinforcements
Score 0.00 of 1
14. If an off-location site is available for backing up data and systems, but requires hardware to be installed,
this site is known as __________.
hot sites
backups
reinforcements
cold sites
Score 0.00 of 1
15. One of the safest procedures to protect software and data is to include __________.