COSC 100 Exam Questions and Answers
Which of the following statements about cookies is NOT true? - Answer -Cookies obtain
your personal information by searching your hard drive.
____ hackers break into systems for non-malicious reasons such as to test system
security vulnerabilities. - Answer -white-hat
A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT
______ - Answer -launch a denial of service (DoS) attack on your computer
ll of the following activities may infect your computer with a virus EXCEPT ________.
a. sharing flash drives
b. downloading or running an e-mail attachment file
c. installing a manufacturer's printer driver
d. downloading video files from peer-to-peer sites - Answer -downloading or running an
e-mail attachment file
With regard to computer protection, quarantining is defined as ________.
a. placing a found virus in a secure area on the hard drive
b.deleting an infected file
c.repairing an infected file
d.updating your antivirus software - Answer -placing a found virus in a secure area on
the hard drive
FBI-related scams involve ________. - Answer -people pretending to represent official
organizations such as the Dept. of Homeland Security
Social ________ is any technique that uses social skills to generate human interaction
that entices individuals to reveal sensitive information. - Answer -engineering
A ________ allows a hacker to gain access to your computer and take almost complete
control of it without your knowledge. - Answer -rootkit
, Which of the following is NOT a virus category?
a. worm
b. logic bomb
c. pharming
d. macro - Answer -pharming
A ________ is a virus that is triggered on a certain date. - Answer -time bomb
A(n) ________ is the portion of virus code that is unique to a particular computer virus. -
Answer -virus signature
Creating and distributing ________ is one of the most widespread types of cybercrimes.
- Answer -computer viruses
________ floods a computer with requests until it shuts down and refuses to answer
any requests for information. - Answer -a DDoS attack
CAPTCHA stands for ________. - Answer -Completely Automated Public Turing Test to
Tell Computers and Humans Apart
Which classification of viruses can change its own code to avoid detection? - Answer -
polymorphic
Which type of virus was the famous Michelangelo virus? - Answer -time bomb
Rules for creating passwords include all of the following EXCEPT ________. - Answer -
use a dictionary to find a lengthy word that is easy to remember
The Internet Crime Complaint Center (IC3) is a partnership between the ________. -
Answer -FBI and National White Collar Crime Center
Configuring a firewall to ignore all incoming packets that request access to a specific
port is known as ________. - Answer -logical port blocking
________ is a program that gathers information about your surfing habits without your
knowledge. - Answer -spyware
________ viruses are often transmitted by a flash drive left in a USB port. - Answer -
boot sector
A ________ is a virus that is attached to documents such as Word or Excel files. -
Answer -macro virus
Which of the following is formally defined as any criminal action perpetrated primarily
through the use of a computer?
a.Phishing
Which of the following statements about cookies is NOT true? - Answer -Cookies obtain
your personal information by searching your hard drive.
____ hackers break into systems for non-malicious reasons such as to test system
security vulnerabilities. - Answer -white-hat
A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT
______ - Answer -launch a denial of service (DoS) attack on your computer
ll of the following activities may infect your computer with a virus EXCEPT ________.
a. sharing flash drives
b. downloading or running an e-mail attachment file
c. installing a manufacturer's printer driver
d. downloading video files from peer-to-peer sites - Answer -downloading or running an
e-mail attachment file
With regard to computer protection, quarantining is defined as ________.
a. placing a found virus in a secure area on the hard drive
b.deleting an infected file
c.repairing an infected file
d.updating your antivirus software - Answer -placing a found virus in a secure area on
the hard drive
FBI-related scams involve ________. - Answer -people pretending to represent official
organizations such as the Dept. of Homeland Security
Social ________ is any technique that uses social skills to generate human interaction
that entices individuals to reveal sensitive information. - Answer -engineering
A ________ allows a hacker to gain access to your computer and take almost complete
control of it without your knowledge. - Answer -rootkit
, Which of the following is NOT a virus category?
a. worm
b. logic bomb
c. pharming
d. macro - Answer -pharming
A ________ is a virus that is triggered on a certain date. - Answer -time bomb
A(n) ________ is the portion of virus code that is unique to a particular computer virus. -
Answer -virus signature
Creating and distributing ________ is one of the most widespread types of cybercrimes.
- Answer -computer viruses
________ floods a computer with requests until it shuts down and refuses to answer
any requests for information. - Answer -a DDoS attack
CAPTCHA stands for ________. - Answer -Completely Automated Public Turing Test to
Tell Computers and Humans Apart
Which classification of viruses can change its own code to avoid detection? - Answer -
polymorphic
Which type of virus was the famous Michelangelo virus? - Answer -time bomb
Rules for creating passwords include all of the following EXCEPT ________. - Answer -
use a dictionary to find a lengthy word that is easy to remember
The Internet Crime Complaint Center (IC3) is a partnership between the ________. -
Answer -FBI and National White Collar Crime Center
Configuring a firewall to ignore all incoming packets that request access to a specific
port is known as ________. - Answer -logical port blocking
________ is a program that gathers information about your surfing habits without your
knowledge. - Answer -spyware
________ viruses are often transmitted by a flash drive left in a USB port. - Answer -
boot sector
A ________ is a virus that is attached to documents such as Word or Excel files. -
Answer -macro virus
Which of the following is formally defined as any criminal action perpetrated primarily
through the use of a computer?
a.Phishing