Comp 110 Chapter 2 Test Exam Questions
With Correct Answers A+
Which of the following is NOT a threat/risk associated with social media? - Answer✔Hardware
failure
Which of the following is NOT a social media website? - Answer✔WalMart.com
Typical pharming attacks usually target _____. - Answer✔banks, financial, and online payment
services.
DNS cache poisoning changes _____. - Answer✔the IP addresses of authentic websites to bogus
websites and addresses while maintaining the domain names
Social engineers use the same methods as _____, except they use technology. - Answer✔Con
men
Which type of social engineering attack might involve giving away USB drives with malware
loaded on them? - Answer✔Baiting
The internet security threat where zombie computers are used to saturate a server with
unsolicited requests is referred to as _____. - Answer✔Denial-of-service
In the world of internet security, the act of online monitoring for the purpose of intercepting and
exploiting information is referred to as _____. - Answer✔Wi-Fi eavesdropping
Which of the following is NOT a type of cyber crime? - Answer✔Phixing
_____ is the best defense against cyber crime. - Answer✔Prevention
Which country is NOT considered a major cyber threat to the United States? - Answer✔United
Kingdom
Which of these is NOT a reason that information is valuable? - Answer✔Allows access to
infrastructure
What do state laws regarding cybercrime generally pertain to? - Answer✔Trespass to a computer
Which of the following is an example of a cybercrime? - Answer✔Identity theft
Network intrusions
Software piracy