2025-2026
1. As the complexity of a network increases, the possibility of security breaches decreases.
a. True
b. False - Answers False
2. An attack that takes place before the security community and/or software developers
become aware of and fix a security vulnerability is called the 'zero-day attack.'
a. True
b. False - Answers True
3. It is not uncommon for computer users to share their login ID and password with coworkers.
a. True
b. False - Answers True
4. Discovery of a vulnerability in a software program can potentially be sold to the government.
a. True
b. False - Answers True
5. You see a deceptive pop-up that says your computer is infected and that you must visit a
compromised web site where you pay them to clean your computer. You have just become a
victim of ransomware.
a. True
b. False - Answers True
6. Macro viruses are called so because they are written using a macro language.
a. True
b. False - Answers True
7. Even legitimate organizations sometimes use email spam for promoting products.
a. True
b. False - Answers True
8. Spam emails make up only a small proportion (<10%) of emails.
, a. True
b. False - Answers False
9. Spam emails do not add to costs because nobody reads them anyways.
a. True
b. False - Answers False
10. There are bots that can sign up for thousands of email accounts.
a. True
b. False - Answers True
11. A zombie computer would send requests to access to the target site again and again.
a. True
b. False - Answers True
12. Educational institutions' Websites are the most commonly targeted sites by phishers
a. True
b. False - Answers False
13. When you receive a text message that there is a problem with your bank account and you
are required you to click on a link to submit some information, you are likely seeing a vishing
attack.
a. True
b. False - Answers False
14. Spear-phishing is when the phisher sends fraudulent emails to a certain organization's
employees.
a. True
b. False - Answers True
15. The computer is running, but not responding to your keyboard inputs. You find that the
network activities are running very slowly. You have probably been hit by a rootkit.
a. True
b. False - Answers True