Computer Security Quiz PDF

Summary

This document contains a quiz focused on computer security topics, covering different types of cyber threats like spoofing and cyberterrorism, along with methods of identifying and managing them, such as digital forensics. The questions are designed to assess the learner's understanding of cybersecurity threats and techniques.

Full Transcript

26\. What is it called when someone changes the FROM section of an email so that the message you receive appears to come from a person other than the one who sent it? \*A) Spoofing B\) DoS C\) Spam D\) Trapper 27\. What program would you use to gain administrative rights to someone\'s computer...

26\. What is it called when someone changes the FROM section of an email so that the message you receive appears to come from a person other than the one who sent it? \*A) Spoofing B\) DoS C\) Spam D\) Trapper 27\. What program would you use to gain administrative rights to someone\'s computer? A\) Bot B\) Executive Android \*C) Rootkit D\) Trojan horse 28\. What is your computer called when it is infected with a malware bot? \*A) Zombie B\) Android C\) E-Ogre D\) Dirty bot 29\. What is a person called when he or she illegally accesses your computer? A\) White-hat intruder B\) Black-hat intruder C\) Blaster \*D) Hacker 30\. What is a person called when they try to hurt a group of people with the use of a computer? A\) White-hat intruder B\) Cracker C\) Social engineer \*D) Cyberterrorist 31\. What category of software does a virus belong to? \*A) Malware B\) Operating systems C\) Application software D\) Systems software 32\. Which of the following replaces a Web site with a substitute that\'s neither attractive nor complimentary? A\) Spoofing B\) Trojan horse virus C\) Key logger \*D) Web defacing 33\. What is a Trojan-horse type program that is activated when you start your computer? A\) Auto-horse B\) Systems charger \*C) Rookit D\) Malware 34\. Who are cyber vandals? A\) Crackers B\) Thrill-seeker hackers C\) White-hat hackers \*D) Black-hat hackers 35\. If someone were to break into Amtrak\'s information systems with the intent to stop trains from running or causing collisions, what would this person be called? A\) Political hacker B\) Cyber hacker C\) Black-hat cracker \*D) Cyberterrorist 36\. Which of the following tasks is not completed during the first phase of digital forensics? A\) Photographing the site and surrounding environment B\) Confiscate digital equipment and passwords C\) Make a forensic image copy of all the information \*D) Turn on the computer and analyze its contents 37\. In digital forensics, what is the second phase of the investigation? A\) Planning B\) Collection C\) Authentication and preservation \*D) Analysis 38\. Can you recover a deleted computer file? A\) Not unless you\'re in the \"safe mode\" B\) No C\) Yes, but only immediately after it has been deleted \*D) Yes, you can get it out of the recycling bin 39\. Can you obtain a disk wiping program that physically removes information from a disk? A\) No, not one that works well B\) Yes, but it may take several hours and several rewipes to completely clean the disk C\) Yes, but some programs still maintain incriminating information about the deleted file and the person who deleted it \*D) Yes, but the process is cumbersome and not full proof 40\. What term depicts the blacking out of sections of a document to hide confidential information? A\) Blackout B\) Whiteout \*C) Redacting D\) Information masking Let\'s play a quiz for above questions. Please provide me questions 1 by 1 don\'t prompt the answers please

Use Quizgecko on...
Browser
Browser