Quiz Chapter 10
Email your answers to the following
quiz questions to the instructor at email@example.com
Subject line - Remember to type
your name, CRN, Quiz Chapter 10
For each question, type the question
number and the letter of your answer.
You may use your book, notes and
computer for all quizzes
____ 1. A computer ____ risk is any event or action that could cause a loss of or damage
to computer hardware, software, data, information, or processing capability. (ch. 10)
____ 2. The term ____ refers to online or Internet-based illegal acts. (ch. 10)
____ 3. All of the following are common ways computers become infected with malware,
except ____. (ch. 10)
a. opening infected files
b. running an infected program
c. booting the computer with infected removable media inserted
in a drive or plugged in a port
d. installing a software package from a CD
____ 4. In applications that allow users to write ____, the security level should be
set so the application warns users that a document they are attempting to open contains a macro. (ch. 10)
c. antivirus definitions
d. antispyware definitions
____ 5. A ____ is hardware and/or software that protects a network’s resources
from intrusion by users on another network such as the Internet. (ch. 10)
b. biometric device
____ 6. ____ detection software automatically analyzes all network traffic, assesses
system vulnerabilities, identifies any unauthorized access (intrusions), and notifies network administrators of suspicious
behavior patterns or system breaches, including violations of firewalls like the ones in the accompanying figure. (ch. 10)
____ 7. Many systems implement access controls using a two-phase process called ____.
a. access or deny
b. identification and authentication
c. access and approval
d. identification and approval
____ 8. A(n) ____ device authenticates a person’s identity by translating a personal
characteristic, such as a fingerprint, into a digital code that then is compared with a digital code stored in the computer
verifying a physical or behavioral characteristic. (ch. 10)
____ 9. Software ____ occurs when someone steals software media, intentionally erases
programs, or illegally copies a program. (ch. 10)
____ 10. An unsolicited e-mail message or newsgroup posting sent to multiple recipients or newsgroups
at once is called ____. (ch. 10)
____ 11. What time is 1700 hours in military time?
a. 7 p.m.
b. 10 p.m.
d. 5 p.m.
____ 12. In the United States Congress, how long is the term for the House of Representatives?
a. 2 years
b. 4 years
c. 6 years