Home    Categories / Topics    Computer   Computer Literacy 101   Chapter 9   

A ________ is a secure Internet pathway that large corporations use to protect sensitive data.

  1. WAN

  2. HAN

  3. LAN

  4. VPN

Answer:

D

Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?

  1. hacking

  2. phishing

  3. social networking

  4. cybercrime

Answer:

D

A majority of online credit card fraud results from:

  1. computer intrusions.

  2. unsolicited e-mail.

  3. phishing.

  4. auction fraud.

Answer:

C

A ________ is a virus that is triggered when certain conditions are met such as a file opening or starting a program a certain number of times.

  1. Trojan horse

  2. boot-sector virus

  3. time bomb

  4. logic bomb

Answer:

D

Which type of virus was the famous Michelangelo virus?

  1. an e-mail virus

  2. a worm

  3. a script virus

  4. a time bomb

Answer:

D

Which of the following classifications of viruses can change its own code?

  1. stealth

  2. worm

  3. multipartite

  4. polymorphic

Answer:

D

A ________ works independently of host file execution and is much more active in spreading itself than a virus is.

  1. time bomb

  2. logic bomb

  3. DDoS

  4. worm

Answer:

D

A(n) ________ virus temporarily erases its code from the files where they reside and then hides in the computer's active memory.

  1. macro

  2. e-mail

  3. logic

  4. stealth

Answer:

D

With regard to computer protection quarantining is defined as:

  1. repairing the infected file.

  2. placing a found virus in a secure area on the hard drive.

  3. updating your antivirus software.

  4. deleting the infected file.

Answer:

B

During the process of ________ the antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive.

  1. inoculation

  2. encryption

  3. quarantining

  4. scanning

Answer:

A