0% found this document useful (0 votes)
57 views6 pages

Hardware Vandalism

1. A firewall restricts transmissions from outside but allows inside users to access the internet. A worm copies itself repeatedly using resources, possibly crashing systems. A VPN provides secure connection to company network. Audit software monitors computer activity. A DOS attack overloads servers to disrupt legitimate transmissions. A UPS protects against power failures. Identity theft involves unauthorized charges on credit cards. A surge protector shields equipment from power spikes. A virus negatively impacts computers without permission. Hardware vandalism involves physical damage. A time bomb activates on a special event or time. A surge protector provides stable current. Antivirus programs find and remove viruses. A digital signature verifies the sender. A cracker illegally accesses to destroy or steal

Uploaded by

Ahmed Ziad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views6 pages

Hardware Vandalism

1. A firewall restricts transmissions from outside but allows inside users to access the internet. A worm copies itself repeatedly using resources, possibly crashing systems. A VPN provides secure connection to company network. Audit software monitors computer activity. A DOS attack overloads servers to disrupt legitimate transmissions. A UPS protects against power failures. Identity theft involves unauthorized charges on credit cards. A surge protector shields equipment from power spikes. A virus negatively impacts computers without permission. Hardware vandalism involves physical damage. A time bomb activates on a special event or time. A surge protector provides stable current. Antivirus programs find and remove viruses. A digital signature verifies the sender. A cracker illegally accesses to destroy or steal

Uploaded by

Ahmed Ziad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

1- A (firewall) is a computer program that permits a user on the internal network to access the internet

but severely restricts transmissions from the outside

2- A (system failure) is the prolonged malfunction of a computer

3- A (worm) is a program that copies itself repeatedly in memory or on a network, using up resources
and possibly shutting down the computer or network

4-A (VPN) provides the mobile user with a secure connection to the company network server

5- (Audit control) software monitors and records computer activity

6- A computer (security risk) is an event, action, or situation that can lead to the loss or destruction of
computer systems or their data

7- An internet (denial of service) attack occurs when an internet server is purposely overloaded so that
it cannot process legitimate transmissions

8- A (uninterruptible power supply) can protect computers from data loss during power failures

9- A (worm) is a program that does NOT have to be executed in order to propagate over a network

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you
may have been the victim of (identity theft)

11- A (surge protector) shield electronic equipment from power spikes

12- A computer (virus) is a potentially damaging computer program that affects, or infects, a computer
negatively by altering the way the computer works without the user’s knowledge or permission

13- A person breaking into a computer laboratory and smashing computers is an example of
(hardware vandalism)

14- A destructive program that remains on a computer system until the occurrence of special event or
time is called a (Time bomb)

15- A (surge protector) uses special electrical components to provide a stable current flow to the
computer and other electronic equipment

16- (Antivirus programs) are designed to search for viruses, notify users when they’re found, and
remove them from infected disks or files

17- A (digital signature) is an encrypted code that a person, website, or organization attaches to an
electronic message to verify the identity the sender

18- A (cracker) is someone who accesses a computer or network illegally but has the intent of destroying
data, stealing information, or other malicious action
19- A (Trojan horse) is a malicious – logic program that hides within or looks a legitimate program and
usually is triggered by a certain condition or action

20- A (cyber terrorist) is someone who uses the internet to destroy or damage computers for political
reasons

21- Another name for a time bomb is a (logic) bomb

22- A (rootkit) is a program that hides in a computer and allows someone from a remote location to
take full control of the computer

23- A (uninterruptible power supply) is a battery-powers piece of equipment that provides backup
power to a computer for a limited time

24- A (cyberextortionist) is someone who uses e-mail as a vehicle for extortion

25- Breaking into other computer system is called (Electronic trespassing)

26- (Corporate spies) are hired to break into a specific computer and steal its proprietary data

27- Crimes that use the internet are called (cybercrimes)

28- Code hidden within a program that damages or destroys files is called a computer (virus)

29- (Denial of service (dos)) attacks bombard servers and web sites with traffic that shuts down
networks

30- (Employee monitoring) allows an employer to observe employee phone calls, e-mails, and Web
browsing

31-(encryption) is the process of converting readable data into unreadable characters to prevent
unauthorized access

32- Firewalls are used to (restrict outsiders from accessing internal data)

33- (Information theft) occurs when someone steals personal or confidential information

34- In which type of attack does the attacker poses as a legitimate company in an e-mail or website
(phishing)

35- Malicious software is known as (malware)

36- Many web sites require a user to enter a (username), which is a unique combination of characters,
such as letters of alphabet or numbers that identifies one specific user

37- of the currently employed access control methods, (biometric authentication) is the most secure,
because it involves identification of the user’s body, such as his or her eyes or fingerprints
38- (Spoofing) is a technique intruders use to make their network or internet transmission appear
legitimate to a victim computer or network

39- (Spyware) is technology that collects information from computer users without their knowledge or
consent

40- (Software theft) occurs when someone steals software media, intestinally erase programs, or
illegally copies a program

41- The scrambling of code is known as (encryption)

42- The term malware is short for (malicious software)

43-The ability to convey a message without disclosing your name or identity is known as (anonymity)

44- To safeguard your equipment and data against power-related issues, you should always use a (surge
protector)

45-This type of software collects your personal information, monitors your web surfing habits and
distributes this information to a third party (spyware)

46-The ability to convey a message without disclosing your name or identity is known as (anonymity)

47- Using a technique known as (IP spoofing) a message is sent to a computer system using an IP
address disguised as one from a trusted source

48- (Unethical employees) break into their employer’s computers for a variety of reasons to exploit a
security weakness, to seek financial gain from selling confidential information, on to take revenge

49- What do you call a piece of code that attaches to an applications program and secretly spreads when
the application program is executes (Virus)

50- What do you call a program that secretly records information about a computer user’s activities and
sends it out over the internet (Spybot)

51- What do you call a person who access a computer without authorization (Hacker)

52- What do you call a program that perform a useful task while at the same time carrying out some
secret destructive act (Trojan horse)

53- What is the best definition of a computer hacker (A hacker is a person who investigates a computer
system to understand both its full capabilities and vulnerabilities)

54- What do you call a program that has the ability to execute independently and spread over a
computer network? (Worm)

55- Which of the following best describes web bug (a component of a web page that tracks and collects
information about visitors)
56- What is the study of converting information into encoded or scrambled formats called
(Cryptography)

57- Which type of rogue program is disguised as a useful program but contains hidden instructions to
perform a malicious task (Trojan horse)

58- Which of the following best describes a web bug (A component of a web page that tracks and
collects information about visitors)

59- Which of the following passwords provides the most secure choice (3R2Wvx8@)

60- What is the best definition of a cookie (It is a plain-text file written to your hard disk by a web site
you visit)

61- Which of the following groups of people present the greatest threat to a company’s information
structure (Company insiders)

62- Which of the following is true of cookies (They help companies track browsing habits and
preferences of users)

63- Which of the following NOT a technique you can effectively use to reduce the amount of
unauthorized email on your computer (Reply to spam and ask to be removed from the mailing list)

64- A script kiddie has the same intent as a cracker but does not have the technical skills and knowledge
1- A DOS attack is a technique intruders use to make their network or internet transmission
appear legitimate to a victim computer or network (×)

2- A message that has been coded with an encryption key is referred to as encrypto – text (×)

3- A digital signature guarantees that a message has not been tampered with (√)

4- A cyberextortionist is someone who uses the internet or a network to destroy or damage


computers (×)

5- All new cell phones have GPS awareness (√)

6- Before it is encrypted, a readable message is known as ciphertext (×)

7- Computer forensics is a form of computer crime (×)

8- Computer crime often goes unreported because businesses fear negative publicity (√)

9- In general, computer viruses don’t discriminate among operating systems; a typical virus can infect
any system, regardless of platform (×)

10- Information can be recovered from a hard drive even after file have been deleted (√)

11- IP spoofing takes place when hacker sends a message with an IP address disguised as an incoming
message (√)

12- Malware includes spyware, computer viruses and various rogue programs (√)

13- Organized crime and terrorist organizations aren’t likely to commit computer crimes because they
don’t have the expertise (×)

14- Private Key encryption is considered essential for e-commerce (×)

15- Personal firewalls are programs of devices that protect home computers from unauthorized access
(√)

16-Privacy and computer crime are the same (×)

17- Security procedures eliminate all risks to computers (√)

18- Smart cards and biometrics are two ways companies may add physical security to computer systems
(√)

18- Spam is a program placed on a computer without the user (×)

19- Stealing the key used for encryption is called key intermediation (×)
20- The next major war will probably involve some kind of cyber-attacks (√)

21- The majority of computer crimes are committed by hackers and vandals with no ties to the
victim companies (×)

22- The most widely used data recovery technique is making regular backups (√)

23- Wireless access poses additional security risks (√)

24- When you browse from site to site, the cookie that has been loaded onto the computer’s hard drive
is not detected, read and matched with previous browsing activity (×)

You might also like