Hardware Vandalism
Hardware Vandalism
3- A (worm) is a program that copies itself repeatedly in memory or on a network, using up resources
and possibly shutting down the computer or network
4-A (VPN) provides the mobile user with a secure connection to the company network server
6- A computer (security risk) is an event, action, or situation that can lead to the loss or destruction of
computer systems or their data
7- An internet (denial of service) attack occurs when an internet server is purposely overloaded so that
it cannot process legitimate transmissions
8- A (uninterruptible power supply) can protect computers from data loss during power failures
9- A (worm) is a program that does NOT have to be executed in order to propagate over a network
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you
may have been the victim of (identity theft)
12- A computer (virus) is a potentially damaging computer program that affects, or infects, a computer
negatively by altering the way the computer works without the user’s knowledge or permission
13- A person breaking into a computer laboratory and smashing computers is an example of
(hardware vandalism)
14- A destructive program that remains on a computer system until the occurrence of special event or
time is called a (Time bomb)
15- A (surge protector) uses special electrical components to provide a stable current flow to the
computer and other electronic equipment
16- (Antivirus programs) are designed to search for viruses, notify users when they’re found, and
remove them from infected disks or files
17- A (digital signature) is an encrypted code that a person, website, or organization attaches to an
electronic message to verify the identity the sender
18- A (cracker) is someone who accesses a computer or network illegally but has the intent of destroying
data, stealing information, or other malicious action
19- A (Trojan horse) is a malicious – logic program that hides within or looks a legitimate program and
usually is triggered by a certain condition or action
20- A (cyber terrorist) is someone who uses the internet to destroy or damage computers for political
reasons
22- A (rootkit) is a program that hides in a computer and allows someone from a remote location to
take full control of the computer
23- A (uninterruptible power supply) is a battery-powers piece of equipment that provides backup
power to a computer for a limited time
26- (Corporate spies) are hired to break into a specific computer and steal its proprietary data
28- Code hidden within a program that damages or destroys files is called a computer (virus)
29- (Denial of service (dos)) attacks bombard servers and web sites with traffic that shuts down
networks
30- (Employee monitoring) allows an employer to observe employee phone calls, e-mails, and Web
browsing
31-(encryption) is the process of converting readable data into unreadable characters to prevent
unauthorized access
32- Firewalls are used to (restrict outsiders from accessing internal data)
33- (Information theft) occurs when someone steals personal or confidential information
34- In which type of attack does the attacker poses as a legitimate company in an e-mail or website
(phishing)
36- Many web sites require a user to enter a (username), which is a unique combination of characters,
such as letters of alphabet or numbers that identifies one specific user
37- of the currently employed access control methods, (biometric authentication) is the most secure,
because it involves identification of the user’s body, such as his or her eyes or fingerprints
38- (Spoofing) is a technique intruders use to make their network or internet transmission appear
legitimate to a victim computer or network
39- (Spyware) is technology that collects information from computer users without their knowledge or
consent
40- (Software theft) occurs when someone steals software media, intestinally erase programs, or
illegally copies a program
43-The ability to convey a message without disclosing your name or identity is known as (anonymity)
44- To safeguard your equipment and data against power-related issues, you should always use a (surge
protector)
45-This type of software collects your personal information, monitors your web surfing habits and
distributes this information to a third party (spyware)
46-The ability to convey a message without disclosing your name or identity is known as (anonymity)
47- Using a technique known as (IP spoofing) a message is sent to a computer system using an IP
address disguised as one from a trusted source
48- (Unethical employees) break into their employer’s computers for a variety of reasons to exploit a
security weakness, to seek financial gain from selling confidential information, on to take revenge
49- What do you call a piece of code that attaches to an applications program and secretly spreads when
the application program is executes (Virus)
50- What do you call a program that secretly records information about a computer user’s activities and
sends it out over the internet (Spybot)
51- What do you call a person who access a computer without authorization (Hacker)
52- What do you call a program that perform a useful task while at the same time carrying out some
secret destructive act (Trojan horse)
53- What is the best definition of a computer hacker (A hacker is a person who investigates a computer
system to understand both its full capabilities and vulnerabilities)
54- What do you call a program that has the ability to execute independently and spread over a
computer network? (Worm)
55- Which of the following best describes web bug (a component of a web page that tracks and collects
information about visitors)
56- What is the study of converting information into encoded or scrambled formats called
(Cryptography)
57- Which type of rogue program is disguised as a useful program but contains hidden instructions to
perform a malicious task (Trojan horse)
58- Which of the following best describes a web bug (A component of a web page that tracks and
collects information about visitors)
59- Which of the following passwords provides the most secure choice (3R2Wvx8@)
60- What is the best definition of a cookie (It is a plain-text file written to your hard disk by a web site
you visit)
61- Which of the following groups of people present the greatest threat to a company’s information
structure (Company insiders)
62- Which of the following is true of cookies (They help companies track browsing habits and
preferences of users)
63- Which of the following NOT a technique you can effectively use to reduce the amount of
unauthorized email on your computer (Reply to spam and ask to be removed from the mailing list)
64- A script kiddie has the same intent as a cracker but does not have the technical skills and knowledge
1- A DOS attack is a technique intruders use to make their network or internet transmission
appear legitimate to a victim computer or network (×)
2- A message that has been coded with an encryption key is referred to as encrypto – text (×)
3- A digital signature guarantees that a message has not been tampered with (√)
8- Computer crime often goes unreported because businesses fear negative publicity (√)
9- In general, computer viruses don’t discriminate among operating systems; a typical virus can infect
any system, regardless of platform (×)
10- Information can be recovered from a hard drive even after file have been deleted (√)
11- IP spoofing takes place when hacker sends a message with an IP address disguised as an incoming
message (√)
12- Malware includes spyware, computer viruses and various rogue programs (√)
13- Organized crime and terrorist organizations aren’t likely to commit computer crimes because they
don’t have the expertise (×)
15- Personal firewalls are programs of devices that protect home computers from unauthorized access
(√)
18- Smart cards and biometrics are two ways companies may add physical security to computer systems
(√)
19- Stealing the key used for encryption is called key intermediation (×)
20- The next major war will probably involve some kind of cyber-attacks (√)
21- The majority of computer crimes are committed by hackers and vandals with no ties to the
victim companies (×)
22- The most widely used data recovery technique is making regular backups (√)
24- When you browse from site to site, the cookie that has been loaded onto the computer’s hard drive
is not detected, read and matched with previous browsing activity (×)