1.
Spyware programs that monitor keystrokes with the intent of stealing passwords, login IDs, or credit card information are referred to as ________.
Correct Answer
B. Keystroke loggers
Explanation
Keystroke loggers are spyware programs that monitor keystrokes with the intention of stealing sensitive information such as passwords, login IDs, or credit card details. They record every keystroke made on a computer, allowing the attacker to gather valuable data without the user's knowledge. These programs are designed to covertly collect personal information, making them a significant threat to online security and privacy.
2.
A(n) ________ virus temporarily erases its code from the files where it resides and then hides in the computer's active memory.
Correct Answer
C. Stealth
Explanation
A stealth virus is a type of virus that temporarily removes its code from the files it infects and hides in the computer's active memory. This allows the virus to avoid detection by antivirus software and continue its malicious activities without being detected. Stealth viruses are designed to be highly elusive and difficult to detect, making them a significant threat to computer systems.
3.
A ________ works independently of host file execution and is much more active in spreading itself than a virus is.
Correct Answer
D. A worm
Explanation
A worm is a type of malware that can replicate itself and spread across computer networks without requiring a host file to execute. Unlike a virus, which typically requires user interaction or the execution of a program to spread, a worm can actively propagate itself and infect other systems. This makes worms more aggressive and efficient in spreading compared to viruses, as they can quickly infect multiple devices and networks. Therefore, a worm is the correct answer because it fits the description of a malware that works independently of host file execution and is more active in spreading itself than a virus.
4.
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.
Correct Answer
A. Logical port blocking
Explanation
Logical port blocking refers to the process of configuring a firewall to ignore all incoming packets that request access to a specific port. This means that any packets attempting to access the specified port will be blocked and not allowed through the firewall. This is a security measure commonly used to protect against unauthorized access and potential threats from external sources.
5.
All of the following approaches can be taken to protect your notebook computer from theft EXCEPT:
Correct Answer
C. Installing an external hard drive.
Explanation
Installing an external hard drive does not directly protect the notebook computer from theft. It may provide additional storage space, but it does not have any security features to prevent or deter theft. The other options listed, such as attaching a motion alarm, installing location-tracking software, and locking the notebook to a work surface, are all security measures that can help protect the notebook from being stolen.
6.
A(n) ________ is the portion of virus code that is unique to a particular computer virus.
Correct Answer
B. Virus signature
Explanation
A virus signature refers to the specific code or pattern that is unique to a particular computer virus. It is like a fingerprint that helps identify and differentiate one virus from another. Virus signatures are used by antivirus software to detect and remove viruses from infected systems. By comparing the code of a suspected file or program to a database of known virus signatures, antivirus programs can identify and quarantine or delete the virus.
7.
Rules for creating passwords include all of the following EXCEPT:
Correct Answer
C. keep your password written down and stored in any easy-to-remember location.
Explanation
The given answer, "keep your password written down and stored in any easy-to-remember location," is incorrect because it goes against the rules for creating passwords. It is important to keep passwords confidential and not write them down or store them in easily accessible locations to prevent unauthorized access. The other options mentioned in the question, such as changing passwords frequently, creating complex passwords, and keeping passwords secret, are all valid rules for password security.
8.
The most likely method a hacker would use to access a computer is ________.
Correct Answer
A. Entering through its Internet connection
Explanation
A hacker would most likely use the method of entering through a computer's Internet connection to gain unauthorized access. This is because the Internet connection is the primary gateway for communication between the computer and the outside world, making it a common target for hackers. By exploiting vulnerabilities in the network or using techniques such as phishing or malware, hackers can infiltrate the computer system and gain control or steal sensitive information.
9.
A computer virus normally attaches itself to another computer program known as a ________.
Correct Answer
B. Host program
Explanation
A computer virus typically attaches itself to another computer program known as a host program. The host program serves as a carrier for the virus, allowing it to spread and replicate within the computer system. By attaching to the host program, the virus can execute its malicious code and potentially infect other files and programs on the computer. This method of attachment allows the virus to remain hidden and increases its chances of spreading undetected.
10.
During the process of ________ the antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive.
Correct Answer
B. Inoculation
Explanation
During the process of inoculation, the antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive. This helps the antivirus software to identify and recognize any potential threats or malicious files in the future. By inoculating the files, the antivirus software creates a sort of immunity for your computer, making it more effective in detecting and protecting against viruses and other malware.
11.
Devices that use a unique personal characteristic, such as a fingerprint, in place of a password are called ________ authentication devices.
Correct Answer
D. Biometric
Explanation
Biometric authentication devices use a unique personal characteristic, such as a fingerprint, in place of a password. This type of authentication relies on the biological characteristics of an individual, such as fingerprints, iris patterns, or facial features, to verify their identity. Therefore, the correct term to describe these devices is "biometric authentication devices."
12.
Many ________ sold for home use are also configured as firewalls and are capable of performing network address translation (NAT).
Correct Answer
B. Routers
Explanation
Routers are devices that are commonly used for home networking purposes. They are capable of performing network address translation (NAT), which allows multiple devices in a home network to share a single internet connection. This feature also provides an added layer of security by acting as a firewall, protecting the network from unauthorized access. Therefore, routers are often configured as firewalls and are commonly sold for home use.
13.
Which of these statements about physically protecting your computer is FALSE?
Correct Answer
C. Data line surges can be blocked by using a computer surround
Explanation
Data line surges cannot be blocked by using a computer surround. A computer surround typically refers to a protective case or enclosure for a computer, which is designed to protect the computer from physical damage such as impact or dust. However, it does not provide any protection against data line surges, which are sudden spikes in electrical voltage that can occur on the data lines connected to the computer (such as Ethernet or USB cables). To protect against data line surges, additional measures such as using surge protectors or installing surge suppression devices on the data lines are required.
14.
The purpose of network address translation (NAT) is to ________.
Correct Answer
B. hide user IP addresses from the Internet
Explanation
NAT, or Network Address Translation, is used to hide user IP addresses from the Internet. It allows multiple devices within a private network to share a single public IP address, which enhances security and conserves IP addresses. By translating the private IP addresses of the devices into a single public IP address, NAT ensures that the individual IP addresses of the devices are not exposed to the Internet, providing an additional layer of privacy and protection.
15.
A cyberspace ________ is an attempt to make someone believe something that is untrue.
Correct Answer
D. Hoax
Explanation
A cyberspace hoax refers to a deliberate attempt to deceive someone by making them believe something that is false. It involves spreading false information or creating fake stories with the intention of tricking people into believing them. Unlike a prank or joke, which may be intended for amusement, a hoax is designed to mislead and deceive others. A legend, on the other hand, typically refers to a traditional story or myth, which may or may not be true.
16.
Which type of virus was the famous Michelangelo virus?
Correct Answer
B. A time bomb
Explanation
The Michelangelo virus was a type of time bomb virus. A time bomb virus is a malicious program that remains dormant on a computer until a specific date or trigger event occurs. In the case of the Michelangelo virus, it was programmed to activate on March 6th, which is the birthday of the famous Italian artist Michelangelo. Once activated, the virus would overwrite the first 100 sectors of the hard drive, rendering the computer inoperable. This type of virus gained significant media attention in the early 1990s due to its potential to cause widespread damage.
17.
Which of the following is a program that appears to be something useful or desirable but does something malicious in the background?
Correct Answer
A. a Trojan horse
Explanation
A Trojan horse is a program that appears to be something useful or desirable but actually carries out malicious activities in the background. It tricks the user into thinking that it is harmless or beneficial, but once it is executed, it can perform actions such as stealing personal information, damaging files, or giving unauthorized access to the attacker. Unlike viruses and worms, Trojan horses do not self-replicate or spread on their own.
18.
Which of the following classifications of viruses can change its own code to avoid detection?
Correct Answer
C. PolymorpHic
Explanation
Polymorphic viruses are able to change their own code to avoid detection. This means that each time the virus replicates itself, it alters its own code, making it difficult for antivirus software to recognize and detect the virus. By constantly changing its code, the polymorphic virus can evade detection and continue to infect systems without being detected by security measures.
19.
A ________ is a virus that is attached to documents such as Word or Excel files.
Correct Answer
B. Macro virus
Explanation
A macro virus is a type of virus that infects documents, such as Word or Excel files, by attaching itself to the macros within these files. Macros are sets of instructions or commands that automate tasks within these documents. When a document containing a macro virus is opened, the virus is executed and can spread to other documents or perform malicious actions, such as deleting files or stealing information. Therefore, a macro virus is the correct answer as it specifically targets and infects documents with macros.
20.
Using a ________, hackers can access and delete all files on your computer, send e-mail, run programs, and do just about anything else you can do with your computer.
Correct Answer
C. Backdoor program
Explanation
A backdoor program is a type of malicious software that allows hackers to gain unauthorized access to a computer system. Once installed, it provides a secret entry point that bypasses normal authentication procedures, giving the hacker full control over the system. This means they can access and delete files, send emails, run programs, and perform any other actions that the computer owner can do. In essence, a backdoor program grants hackers unrestricted access to a compromised computer, enabling them to carry out various malicious activities undetected.
21.
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
Correct Answer
A. Engineering
Explanation
Social engineering is a technique that manipulates human behavior to gain access to sensitive information. It involves using social skills to deceive or manipulate individuals into revealing confidential information. This can be done through various methods such as impersonation, pretexting, or manipulation tactics. The term "engineering" in this context refers to the act of manipulating or engineering human interactions to achieve the desired outcome of obtaining sensitive information.
22.
You can block logical ports to invaders and make your computer invisible to others on the Internet by installing ________.
Correct Answer
A. Firewall
Explanation
A firewall is a security device or software that monitors and controls incoming and outgoing network traffic based on predetermined security rules. By installing a firewall, you can block logical ports to invaders and prevent unauthorized access to your computer from the internet. This makes your computer invisible to others and helps protect it from potential threats and attacks. A packet filter, packet sniffer, and antivirus filter do not provide the same level of protection as a firewall.
23.
A ________ is a virus that is triggered when certain conditions are met, such as a file opening or starting a program a certain number of times.
Correct Answer
C. Logic bomb
Explanation
A logic bomb is a type of virus that remains dormant until specific conditions are met, such as a file opening or a program being started a certain number of times. Once these conditions are met, the logic bomb is triggered and executes its malicious payload. Unlike other types of viruses, logic bombs are designed to be hidden and undetectable until their activation criteria are fulfilled. They are often used to cause damage or disruption to a computer system or network.