Filters
Question type

The________ criminalizes a wide variety of hacker-related activities.

Correct Answer

verifed

verified

Computer F...

View Answer

A file accompanying an email message is called an________ .

Correct Answer

verifed

verified

Vote-counting irregularities in the State of________ in the 2000 U.S. Presidential election led to more interest in computerized voting systems.

Correct Answer

verifed

verified

According to some estimates, 90 percent of spam is distributed through________ networks.

Correct Answer

verifed

verified

An intentional action designed to prevent legitimate users from making use of a computer service is called a________ .

Correct Answer

verifed

verified

denial-of-...

View Answer

A ________is a piece of self-replicating code embedded within another program called the host.

Correct Answer

verifed

verified

A ________is a self-contained program that spreads through a computer network by exploiting security holes in the computers connected to the network.

Correct Answer

verifed

verified

Manipulating someone within an organization to gain access to confidential information is called


A) diving.
B) hacking.
C) phreaking.
D) social engineering.
E) trashing.

Correct Answer

verifed

verified

The Internet worm was released by


A) John Barlow.
B) Katie Hafner.
C) John Markoff.
D) Robert Morris, Jr.
E) Bruce Sterling.

Correct Answer

verifed

verified

D

A ________is a computer, positioned between a local network and the Internet, that monitors the packets flowing in and out.

Correct Answer

verifed

verified

A program with a benign capability that conceals another, sinister purpose is called a


A) hack.
B) rogue.
C) Trojan horse.
D) virus.
E) worm.

Correct Answer

verifed

verified

A software program that responds to commands sent by a command-and-control program located on an external computer is called a


A) bot.
B) spoof.
C) vampire.
D) virus.
E) worm.

Correct Answer

verifed

verified

A piece of self-replicating code embedded within another program is called a


A) hack.
B) rogue.
C) Trojan horse.
D) virus.
E) worm.

Correct Answer

verifed

verified

You may find a virus


A) on a hard disk.
B) on a thumb drive.
C) on a CD-ROM.
D) in an email attachment.
E) All of the above

Correct Answer

verifed

verified

E

A self-contained program that spreads through a computer network by exploiting security holes is called a


A) hack.
B) rogue.
C) Trojan horse.
D) virus.
E) worm.

Correct Answer

verifed

verified

E

The Conficker worm is notable because


A) it is Cuba's first attempt at cyberwarfare.
B) it is the fastest spreading worm of all time.
C) it shut down the White House Web site for three days.
D) computer experts have found it particularly difficult to eradicate.
E) All of the above.

Correct Answer

verifed

verified

An intentional action designed to prevent legitimate users from making use of a computer service is called


A) a bombing run.
B) a curtain closer.
C) a denial-of-service attack.
D) an electronic overdose.
E) phreaking.

Correct Answer

verifed

verified

The manipulation of a person inside an organization to gain access to confidential information is called ________.

Correct Answer

verifed

verified

Anonymous is


A) an activist group that promotes the interests of the Recording Industry Association of America.
B) a loosely organized group of hacktivists that claimed responsibility for a DDoS attack on Church of Scientology Web sites.
C) the name given to the People's Liberation Army group that was responsible for more than 100 intrusions around the world.
D) the name of the group that launched the Stuxnet worm.
E) All of the above except c.

Correct Answer

verifed

verified

Showing 1 - 19 of 19

Related Exams

Show Answer