Quiz 7 Flashcards
A file accompanying an email message is called an _______________.
attachment
According to some estimates, 90 percent of spam is distributed through ____________ networks.
bot
Manipulating someone within an organization to gain access to confidential information is called A) phreaking. B) trashing. C) diving. D) hacking. E) social engineering.
E) social engineering.
The Internet worm was released by A) Katie Hafner. B) Robert Morris, Jr.. C) Bruce Sterling. D) John Barlow. E) John Markoff.
B) Robert Morris, Jr.
A ____________ is a piece of self-replicating code embedded within another program called the host.
virus
A software program that responds to commands sent by a command-and-control program located on an external computer is called a A) bot. B) spoof. C) worm. D) virus. E) vampire
A) bot.
The Conficker worm is notable because
A) All of the above.
B) it is Cuba’s first attempt at cyberwarfare.
C) it is the fastest spreading worm of all time.
D) computer experts have found it particularly difficult to eradicate.
E) it shut down the White House Web site for three days.
D) computer experts have found it particularly difficult to eradicate.
An intentional action designed to prevent legitimate users from making use of a computer service is called A) phreaking. B) a bombing run. C) a curtain closer. D) an electronic overdose. E) a denial-of-service attack.
E) a denial-of-service attack.
Determining that a person is who he or she claims to be on a computer is called A) accountability. B) debugging. C) authorization. D) social engineering. E) authentication.
E) authentication.
The process of determining that a user has permission to perform a particular action on a computer is called A) authorization. B) accountability. C) debugging. D) social engineering. E) authentication.
A) authorization.
Vote-counting irregularities in the State of _____________ in the 2000 U.S. Presidential election led to more interest in computerized voting systems.
Florida
A program with a benign capability that conceals another, sinister purpose is called a A) worm. B) rogue. C) hack. D) Trojan horse. E) virus.
D) Trojan horse.
A piece of self-replicating code embedded within another program is called a A) worm. B) Trojan horse. C) rogue. D) hack. E) virus.
E) virus.
A self-contained program that spreads through a computer network by exploiting security holes is called a A) hack. B) worm. C) rogue. D) Trojan horse. E) virus.
B) worm.
A ___________ is a self-contained program that spreads through a computer network by exploiting security holes in the computers connected to the network.
worm