HomeAssignment (Homework)AttendanceBooks & MaterialsClass EvaluationClass ScheduleCourse DescriptionDates - Important DatesDCF Chapter SupplementsDCF Quiz ListDo I need my own Computer?Extra CreditFiles - Support FilesHomeworkInstructor's InformationOne-Minute SurveyOther ResourcesPowerPoint ProjectStudent ConductTests: Mid-Term and Final

Quiz Chapter 10

 

 

Email your answers to the following quiz questions to the instructor at lexy@ieee.org

Subject line - Remember to type your name, CRN, Quiz Chapter 10

For each question, type the question number and the letter of your answer.

You may use your book, notes and computer for all quizzes

 

____          1.   A computer ____ risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability. (ch. 10)

a.    security

b.    liability

c.    terrorism

d.    network

 

____          2.   The term ____ refers to online or Internet-based illegal acts. (ch. 10)

a.    malware

b.    cyberthreat

c.    cybercrime

d.    cyberextortion

 

____          3.   All of the following are common ways computers become infected with malware, except ____. (ch. 10)

a.    opening infected files

b.    running an infected program

c.    booting the computer with infected removable media inserted in a drive or plugged in a port

d.    installing a software package from a CD

 

____          4.   In applications that allow users to write ____, the security level should be set so the application warns users that a document they are attempting to open contains a macro. (ch. 10)

a.    Javascript

b.    macros

c.    antivirus definitions

d.    antispyware definitions

 

____          5.   A ____ is hardware and/or software that protects a network’s resources from intrusion by users on another network such as the Internet. (ch. 10)

a.    quarantine

b.    biometric device

c.    firewall

d.    router

 

____          6.   ____ detection software automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access (intrusions), and notifies network administrators of suspicious behavior patterns or system breaches, including violations of firewalls like the ones in the accompanying figure. (ch. 10)

a.    Violation  

b.    Password

c.    Intrusion

d.    Traffic

 

____          7.   Many systems implement access controls using a two-phase process called ____. (ch. 10)

a.    access or deny

b.    identification and authentication

c.    access and approval

d.    identification and approval

 

____          8.   A(n) ____ device authenticates a person’s identity by translating a personal characteristic, such as a fingerprint, into a digital code that then is compared with a digital code stored in the computer verifying a physical or behavioral characteristic. (ch. 10)

a.    authentication

b.    personal

c.    identification.

d.    biometric

 

____          9.   Software ____ occurs when someone steals software media, intentionally erases programs, or illegally copies a program. (ch. 10)

a.    theft

b.    extortion

c.    piracy

d.    terrorism

 

____          10. An unsolicited e-mail message or newsgroup posting sent to multiple recipients or newsgroups at once is called ____. (ch. 10)

a.    spyware

b.    spam

c.    cookies

d.    adware

 

____          11. What time is 1700 hours in military time?

a.    7 p.m.

b.    10 p.m.

c.    Midnight

d.    5 p.m.

 

____          12. In the United States Congress, how long is the term for the House of Representatives?

a.    2 years

b.    4 years

c.    6 years

d.    Life