Review Questions
1. A(n) _____ is a program that secretly attaches itself to a carrier such as a document or program and then executes when that document is opened or program is launched.
A. virus
B. worm
C. rootkit
D. Trojan
2. The first action that a virus takes once it infects a computer is to
A. close all ports
B. erase the payload
C. authenticate
D. replicate
3. Each of the following is a different type of computer virus except
A. file infector virus
B. remote virus
C. resident virus
D. boot virus
4. A computer program that pretends to clean up a hard drive but actually performs a malicious activity is known as a(n)
A. Trojan
B. rootkit
C. worm
D. logic bomb
5. To remove a rootkit from a computer you should
A. erase all files in the WINNT folder
B. expand the Master Boot Record
C. reformat the hard drive and reinstall the operating system
D. flash the ROM BIOS
6. Each of the following could be a logic bomb except
A. Erase all data if John Smith’s name is removed from the list of employees
B. Reformat the hard drive three months after Susan Jones left the company
C. Send spam to all employees
D. If the company’s stock price drops below $10 then credit Jeff Brown with ten additional years of retirement credit
7. _____ is a technique used by spammers to horizontally separate words so they are not trapped by a filter yet can still be read by the human eye.
A. Word splitting
B. Word layering
C. Parsing
D. Speckling
8. _____ is an image spam that is divided into multiple images and each piece of the message is divided and then layered to create a complete and legible message.
A. GIF layering
B. word splitting
C. geometric variance
D. split painting
9. _____ is a general term used for describing software that violates a user’s personal security.
A. Spamware
B. Warezware
C. Adaware
D. Spyware
10. A(n) _____ is either a small hardware device or a program that monitors each keystroke a user types on the computer's keyboard.
A. keylogger
B. macro
C. script kiddie
D. port replicator
11. Attackers use _____ to remotely control zombies.
A. Google
B. e-mail
C. spam
D. Internet Relay Chat (IRC)
12. On modern computer systems the BIOS is stored on a _____ chip
A. Silver flash
B. Basic Output/Input
C. Programmable Read Only Memory (PROM)
D. Read Only Memory (ROM)
13. Each of the following is an advantage of a USB device except
A. slower speed
B. nonvolatile
C. better shock resistance
D. tolerates temperature extremes
14. _____ is a single, dedicated hard disk-based file storage device that provides centralized and consolidated disk storage that is available to users through a standard network connection.
A. Storage Area Network (SAN)
B. Network Attached Storage (NAS)
C. Attached Device Repository (ADR)
D. Network Data Pool (NDP)
15. Each of the following is an attack that can be used against cell phones except
A. Lure users to malicious websites
B. Infect the cell phone with malware
C. Attack other cell phone users
D. Turn off the cell phone
16. The ability to move a virtual machine from one physical computer to another with no impact on users is called ____.
A. server balancing
B. VLAN segmentation
C. hypervisor storage
D. live migration
17. The _____ is the software that runs on a physical computer and manages multiple virtual machine operating systems.
A. virtual resource allocator (VRA)
B. hypervisor
C. Microsoft Control Plug-in
D. hardware allocator
18. _____ is exploiting a vulnerability in the software to gain access to resources that the user would normally be restricted from obtaining.
A. Vulnerability assessment
B. Software threat release (STR)
C. Hardware virus
D. Privilege escalation
19. Each of the following is the reason why adware is scorned except
A. It displays objectionable content
B. It can cause a computer to crash or slowdown
C. It can interfere with a user’s productivity
D. It displays the attackers programming skills
20. An attacker who controls multiple zombies in a botnet is known as a(n)
A. Bot herder
B. Zombie shepherd
C. Rogue IRC
D. Cyber-Robot