Content Frame
Note for screen reader users: There is text between the form elements on this page. To be sure that you do not miss any text, use item by item navigation methods, rather than tabbing from form element to form element.
Skip Breadcrumb Navigation
Home  arrow Chapter 9  arrow Online Study Guide

Online Study Guide



This activity contains 40 questions.

Question 1.
A computer __________ is a computer program that attaches itself to another computer program and attempts to spread to other computers when files are exchanged.


Open Hint for Question 1 in a new window.
 
End of Question 1


Question 2.
The Conficker __________ broke out in November 2008 and infected an estimated 9 to 15 million computers.


Open Hint for Question 2 in a new window.
 
End of Question 2


Question 3.
Released in 1999, Melissa was the first practical example of a(n) ________ virus.


Open Hint for Question 3 in a new window.
 
End of Question 3


Question 4.
A __________ is a miniprogram that is executed on your computer without your knowledge.


Open Hint for Question 4 in a new window.
 
End of Question 4


Question 5.
A virus __________ is a section of the virus code that uniquely identifies a computer virus.


Open Hint for Question 5 in a new window.
 
End of Question 5


Question 6.
__________ use tools created by skilled hackers that enable unskilled novices to cause the same mayhem as professional hackers.


Open Hint for Question 6 in a new window.
 
End of Question 6


Question 7.
In a(n) _________ backup, only files changed since the last time a backup was performed are backed up.


Open Hint for Question 7 in a new window.
 
End of Question 7


Question 8.
__________ make it possible to intercept and read the contents of data packets, which can include private information such as credit card numbers.


Open Hint for Question 8 in a new window.
 
End of Question 8


Question 9.
Computer users who gain access to other companies' or people's computer systems with the intent to destroy information or for illegal gain are known as __________.


Open Hint for Question 9 in a new window.
 
End of Question 9


Question 10.
__________ downloads can be used by Web sites to attack your computer by downloading harmful software onto your computer.


Open Hint for Question 10 in a new window.
 
End of Question 10


Question 11.
Engaging in activities such as playing games, reading personal e-mail, and checking sports scores when at work is called __________.


Open Hint for Question 11 in a new window.
 
End of Question 11


Question 12.
A __________ virus is designed to infect multiple file types in an effort to fool the antivirus software that is looking for it.


Open Hint for Question 12 in a new window.
 
End of Question 12


Question 13.
A __________ is defined as anyone who breaks into a computer system (whether an individual computer or a network) unlawfully.


Open Hint for Question 13 in a new window.
 
End of Question 13


Question 14.
__________ change their own code (or periodically rewrite themselves) to avoid detection.


Open Hint for Question 14 in a new window.
 
End of Question 14


Question 15.
Which of the following is a strong password?


Open Hint for Question 15 in a new window.
 
End of Question 15


Question 16.
In a __________ attack, legitimate users are denied access to a computer system because a hacker is repeatedly making requests of that computer system through a zombie computer.


Open Hint for Question 16 in a new window.
 
End of Question 16


Question 17.
A __________ is a virtual communications gateway or path that allows a computer to organize requests for information from other networks or computers.


Open Hint for Question 17 in a new window.
 
End of Question 17


Question 18.
Which of the following is NOT a symptom of a computer virus?


Open Hint for Question 18 in a new window.
 
End of Question 18


Question 19.
A cybercrime is any criminal action committed primarily through the use of a computer.


Open Hint for Question 19 in a new window.
   
 
End of Question 19


Question 20.
Downloading infected audio and video files from peer-to-peer file sharing sites is a major source of virus infections.


Open Hint for Question 20 in a new window.
   
 
End of Question 20


Question 21.
The master boot record is a program that executes whenever a computer starts up.


Open Hint for Question 21 in a new window.
   
 
End of Question 21


Question 22.
Stealth viruses run a program that searches for common data files and compresses them using a complex encryption key.


Open Hint for Question 22 in a new window.
   
 
End of Question 22


Question 23.
A UPS is a device that contains surge protection equipment and a large battery.


Open Hint for Question 23 in a new window.
   
 
End of Question 23


Question 24.
Firewalls are software programs or hardware devices designed to keep computers safe from hackers.


Open Hint for Question 24 in a new window.
   
 
End of Question 24


Question 25.
A distributed denial-of-service (DDoS) attack launches DDoS attacks from multiple zombies at the same time.


Open Hint for Question 25 in a new window.
   
 
End of Question 25


Question 26.
Firewalls specifically designed for home networks are called personal firewalls and are easily installed.


Open Hint for Question 26 in a new window.
   
 
End of Question 26


Question 27.
All computers connected to the Internet have a unique address, which is called an Internet Protocol (IP) address.


Open Hint for Question 27 in a new window.
   
 
End of Question 27


Question 28.
To prevent the spread of infection to other files, the procedure known as isolation places viruses in a secure area on your hard drive.


Open Hint for Question 28 in a new window.
   
 
End of Question 28


Question 29.
To prevent infection of key files on your computer, the process known as inoculation records key attributes about files on your computer and keeps these statistics in a safe place on your hard drive.


Open Hint for Question 29 in a new window.
   
 
End of Question 29


Question 30.
Black hat hackers are experts who perform a needed service for society by helping companies realize the vulnerabilities that exist in their systems.


Open Hint for Question 30 in a new window.
   
 
End of Question 30


Question 31.
Bluetooth is a transmission medium for exchanging data wirelessly over short distances.


Open Hint for Question 31 in a new window.
   
 
End of Question 31


Question 32.
Cybercrime refers to any criminal action perpetrated primarily through the use of a computer.


Open Hint for Question 32 in a new window.
   
 
End of Question 32


Question 33.
Social engineering refers to activities that use human interaction to trick individuals into divulging sensitive information.


Open Hint for Question 33 in a new window.
   
 
End of Question 33


Question 34.
An uninterruptible power supply (UPS) contains surge protection equipment and a large battery.


Open Hint for Question 34 in a new window.
   
 
End of Question 34


Question 35.
Bluebugging uses a flaw in Bluetooth access software to access a Bluetooth device and steal the information contained on it.


Open Hint for Question 35 in a new window.
   
 
End of Question 35


Question 36.
Stealth viruses are designed to infect multiple file types in an effort to fool the antivirus software that is looking for them.


Open Hint for Question 36 in a new window.
   
 
End of Question 36


Question 37.
Match the following terms with their correct descriptions.




Open Hint for Question 37 in a new window.
A matching question presents 5 answer choices and 5 items. The answer choices are lettered A through E. The items are numbered 37.1 through 37.5. Screen readers will read the answer choices first. Then each item will be presented along with a select menu for choosing an answer choice. Using the pull-down menus, match each item in the left column to the corresponding item in the right column.
A unwanted or junk e-mail
B software that displays sponsored advertisements in a section of your browser window or as a pop-up ad box
C small text file that some Web sites automatically store on your computer's hard drive when you visit the site.
D unwanted piggyback program that usually downloads with the software you want to install from the Internet and runs in the background of your system
E can be used to steal passwords, login IDs, or credit card information
[hint] 
[hint] 
[hint] 
[hint] 
[hint] 
End of Question 37


Question 38.
Match the following terms with their correct descriptions.




Open Hint for Question 38 in a new window.
A matching question presents 6 answer choices and 6 items. The answer choices are lettered A through F. The items are numbered 38.1 through 38.6. Screen readers will read the answer choices first. Then each item will be presented along with a select menu for choosing an answer choice. Using the pull-down menus, match each item in the left column to the corresponding item in the right column.
A computers controlled by hackers using a backdoor program
B viruses that temporarily erase their code from the files where they reside and hide in the active memory of the computer
C travel between systems through network connections and spread an infection by infecting a host file.
D program that appears to be something useful or desirable but at the same time does something malicious in the background without your knowledge
E viruses triggered when certain conditions are met
F viruses triggered by the passage of time or a certain date
[hint] 
[hint] 
[hint] 
[hint] 
[hint] 
[hint] 
End of Question 38


Question 39.
Match the following terms with their correct descriptions.




Open Hint for Question 39 in a new window.
A matching question presents 5 answer choices and 5 items. The answer choices are lettered A through E. The items are numbered 39.1 through 39.5. Screen readers will read the answer choices first. Then each item will be presented along with a select menu for choosing an answer choice. Using the pull-down menus, match each item in the left column to the corresponding item in the right column.
A a well-known hoax that is incorporated into society as a true event even though it is false
B attempts to make someone believe something that is untrue
C uses e-mail messages to lure recipients into revealing personal information such as credit card numbers, Social Security numbers, or other sensitive information that could lead to identity theft
D creating a scenario that sounds legitimate enough that someone will trust the caller
E plants malicious code on your computer that alters your browser's ability to find Web addresses
[hint] 
[hint] 
[hint] 
[hint] 
[hint] 
End of Question 39


Question 40.
Match the following key attributes of secure information systems with their correct descriptions.




Open Hint for Question 40 in a new window.
A matching question presents 5 answer choices and 5 items. The answer choices are lettered A through E. The items are numbered 40.1 through 40.5. Screen readers will read the answer choices first. Then each item will be presented along with a select menu for choosing an answer choice. Using the pull-down menus, match each item in the left column to the corresponding item in the right column.
A security measures designed to protect an information system against acceptance of a fraudulent transmission of data by establishing the validity of a data transmission, message, or the identity of the sender
B the assurance that information is not disclosed to unauthorized persons, processes, or devices
C extent to which a data-processing system is able to receive and process data
D the quality that an information system has if the processing of information is logical and accurate and the data is protected against unauthorized modifications or destruction
E the capability of a security system to guarantee that a message or data can be proven to have originated from a specific person and was processed by the recipient
[hint] 
[hint] 
[hint] 
[hint] 
[hint] 
End of Question 40





Pearson Copyright © 1995 - 2011 Pearson Education . All rights reserved. Pearson Prentice Hall is an imprint of Pearson .
Legal Notice | Privacy Policy | Permissions

Return to the Top of this Page