1.
Protective software or hardware that is designed to prevent hacking and other attacks over a network is a firewall
Correct Answer
A. True
Explanation
A firewall is a form of protective software or hardware that is specifically designed to prevent unauthorized access, hacking, and other malicious attacks from occurring over a network. It acts as a barrier between a trusted internal network and an untrusted external network, filtering incoming and outgoing network traffic based on predetermined security rules. By enforcing these rules, a firewall helps to ensure the security and integrity of the network by blocking potentially harmful or malicious traffic while allowing legitimate communication to pass through. Therefore, the statement "Protective software or hardware that is designed to prevent hacking and other attacks over a network is a firewall" is true.
2.
The altering of a software product to remove copy protection is a hacker
Correct Answer
B. False
Explanation
crack
3.
A type of virus that hides within a data file or a program is a macro virus
Correct Answer
B. False
Explanation
trojan horse
4.
A method of infecting a file that affects a specific component of application software such as Microsoft word or Microsoft excel is a macro virus
Correct Answer
A. True
Explanation
A macro virus is a type of virus that infects files by embedding malicious code within macros, which are small programs that automate tasks within software applications such as Microsoft Word or Excel. When the infected file is opened, the macro virus can execute its malicious code, potentially causing harm to the user's computer or spreading the virus to other files. Therefore, the statement that a method of infecting a file that affects a specific component of application software is a macro virus is true.
5.
A critical and perhaps major component of any disaster recovery plan is a cyberwar
Correct Answer
B. False
Explanation
data backup
6.
A device that helps prevent computer damage when there is a spike in the electrical power supply is a surge protector
Correct Answer
A. True
Explanation
A surge protector is a device designed to protect electronic devices from voltage spikes or surges in the electrical power supply. When there is a sudden increase in voltage, the surge protector diverts the excess electrical energy to the ground, preventing it from reaching and damaging the connected devices. Therefore, it is true that a surge protector helps prevent computer damage when there is a spike in the electrical power supply.
7.
An individual who breaks into security systems, either out of curiosity or for the challenge is a employee monitoring
Correct Answer
B. False
Explanation
hacker
8.
A term used to describe an organized series of hacker attacks between citizens of different nations over the internet is a cyberwar
Correct Answer
A. True
Explanation
The given statement is true. A cyberwar refers to an organized series of hacker attacks that take place between citizens of different nations over the internet. This term is used to describe a situation where nations engage in offensive and defensive cyber operations to gain an advantage over each other. These attacks can range from disrupting critical infrastructure to stealing sensitive information or launching large-scale coordinated attacks on a nation's digital systems.
9.
A machine or system that measures a human characteristic for purposes of identification is biometric devices
Correct Answer
A. True
Explanation
Biometric devices are indeed machines or systems that measure a human characteristic for identification purposes. These devices can include fingerprint scanners, facial recognition systems, iris scanners, and voice recognition systems. By capturing and analyzing unique physical or behavioral traits, biometric devices can accurately verify and authenticate individuals. Therefore, the given answer "True" is correct.
10.
The legal practice of tracking web surfacing habits, reading email, and videotaping workers without their knowledge or consent is a hacker
Correct Answer
B. False
Explanation
employee monitoring
11.
A company's most valuable possession is often its
Correct Answer
A. Information
Explanation
Information is often considered a company's most valuable possession because it provides critical insights, knowledge, and data that can drive decision-making, innovation, and competitive advantage. Information includes customer data, market trends, financial records, intellectual property, and other proprietary information that can give a company a strategic edge. Without information, companies would struggle to understand their customers, competitors, and industry landscape, making it difficult to adapt, grow, and succeed in the market. Therefore, information is crucial for a company's success and is often protected and valued as a key asset.
12.
A ______________ is a work around or an alteration of a program so that software copy protection is removed
Correct Answer
C. Crack
Explanation
A crack refers to a workaround or alteration made to a program in order to remove software copy protection. This allows unauthorized users to bypass the intended restrictions and use the software without proper licensing or payment. Cracks are typically created by hackers or software pirates who aim to distribute or use the software without adhering to legal requirements.
13.
Passwords are a form of the security measure known as
Correct Answer
C. Authentication
Explanation
Passwords are a form of authentication, as they are used to verify the identity of a user. When a user enters a password, the system compares it to the stored password to determine if the user is authorized to access the system or information. Encryption, on the other hand, is a method used to secure data by converting it into a coded form that can only be decoded with a specific key. While encryption can be used to protect passwords, it is not the same as authentication.
14.
_________________ measure a biometric identifier
Correct Answer
D. All of the above
Explanation
The correct answer is "all of the above." This means that all the options listed (fingerprint scanners, hand geometry systems, computerized facial recognition systems) are used to measure a biometric identifier. Biometric identifiers are unique physical or behavioral characteristics that can be used for identification and authentication purposes. Fingerprint scanners, hand geometry systems, and computerized facial recognition systems are examples of technologies that can capture and analyze biometric data to identify individuals. Therefore, all of these options are correct in terms of measuring a biometric identifier.
15.
A _________ is a program that displays network traffic
Correct Answer
B. Network sniffer
Explanation
A network sniffer is a program that displays network traffic. It is designed to capture and analyze data packets on a network, allowing users to monitor and analyze the traffic flowing through the network. It can be used for various purposes, such as troubleshooting network issues, monitoring network performance, and detecting suspicious or unauthorized activities. Unlike a network hacker, a network sniffer does not imply malicious intent but rather serves as a tool for network analysis and monitoring. A network hub is a device used to connect multiple devices in a network, and a firewall is a security system that controls incoming and outgoing network traffic.
16.
What is the difference between a software virus and a software worm
Correct Answer
D. A worm actively tries to send itself places
Explanation
A software virus and a software worm are both types of malicious software, but they have some key differences. While a virus can replicate and spread by attaching itself to files or programs, a worm is capable of independently spreading across networks or systems without needing a host. In other words, a worm actively tries to send itself to other places, making it more self-propagating and potentially more widespread than a virus. This characteristic sets worms apart from viruses in terms of their method of propagation.
17.
_____eliminates the need for users to remember user ids and passwords for multiple systems
Correct Answer
A. Single sign on (sso)
Explanation
Single sign-on (SSO) is a system that allows users to access multiple systems or applications with just one set of login credentials. With SSO, users do not need to remember multiple usernames and passwords for different systems, which eliminates the hassle of managing multiple login credentials. Instead, they can authenticate themselves once and gain access to all the authorized systems or applications seamlessly. Therefore, SSO is the correct answer as it effectively eliminates the need for users to remember user IDs and passwords for multiple systems.
18.
Which of the following is the most likely way to get a virus on your computer
Correct Answer
A. Downloading a game from the internet and running it
Explanation
Downloading a game from the internet and running it is the most likely way to get a virus on your computer. When downloading files from the internet, there is a risk of downloading infected files, especially from untrustworthy sources. Running the downloaded game increases the chances of executing malicious code embedded within the game, leading to the installation of a virus or malware on the computer. It is essential to be cautious when downloading files and only download from reputable sources to minimize the risk of getting a virus.
19.
A powerful form of attack upon a web site that is difficult to guard against and often involves an organized team of hackers is called
Correct Answer
C. Denial of service
Explanation
A denial of service attack is a powerful form of attack on a website that is difficult to defend against and often requires an organized team of hackers. In this type of attack, the hackers overwhelm the target website with a flood of traffic or requests, causing it to become unavailable to legitimate users. This can be done through various means, such as sending a large number of requests simultaneously or exploiting vulnerabilities in the website's infrastructure. The goal of a denial of service attack is to disrupt the normal functioning of the website and potentially cause financial or reputational damage to the target.
20.
A power supply for your computer that will keep it running smoothly during brownouts and blackouts is called a
Correct Answer
B. Ups
Explanation
A power supply for your computer that will keep it running smoothly during brownouts and blackouts is called a UPS (Uninterruptible Power Supply). Unlike a surge protector or power strip, a UPS provides battery backup power to your computer in case of power fluctuations or outages. This ensures that your computer remains operational and protected from sudden power loss, allowing you to save your work and safely shut down the computer. A firewall, on the other hand, is a security measure that protects your computer from unauthorized access and threats from the internet.