Page 1 of 189
ITSY 1300 EXAM ALL Chapters 450 QUESTIONS
AND WELL EXPLAINED ANSWERS LATEST
UPDATE JUST RELEASED THIS YEAR
Question: The malicious code attack includes the execution of viruses, worms, Trojan horses,
and active Web scripts with the intent to destroy or steal information.
_________________________
Select one:
True
False - CORRECT ANSWER✔✔True
Question: Packet munchkins use automated exploits to engage in distributed denial-of-service
attacks. _________________________
Select one:
True
False - CORRECT ANSWER✔✔False
, Page 2 of 189
Question: Acts of ____________________ can lead to unauthorized real or virtual actions that
enable information gatherers to enter premises or systems they have not been authorized to
enter.
Select one:
a.
theft
b.
security
c.
trespass
d.
bypass - CORRECT ANSWER✔✔c.
trespass
Question: Complete loss of power for a moment is known as a ____.
Select one:
a.
brownout
b.
fault
, Page 3 of 189
c.
lag
d.
blackout - CORRECT ANSWER✔✔b.
fault
Question: ____________________ are malware programs that hide their true nature, and
reveal their designed behavior only when activated.
Select one:
a.
Worms
b.
Trojan horses
c.
Spam
d.
Viruses - CORRECT ANSWER✔✔b.
Trojan horses
Q:A worm requires that another program is running before it can begin functioning.
, Page 4 of 189
Select one:
True
False - CORRECT ANSWER✔✔False
Question: Attacks conducted by scripts are usually unpredictable.
Select one:
True
False - CORRECT ANSWER✔✔False
Question: Hackers are "persons who access systems and information without authorization and
often illegally." _________________________
Select one:
True
False - CORRECT ANSWER✔✔True
Question: Microsoft acknowledged that if you type a res:// URL (a Microsoft-devised type of
URL) which is longer than ____________________ characters in Internet Explorer 4.0, the
browser will crash.
Select one:
a.
ITSY 1300 EXAM ALL Chapters 450 QUESTIONS
AND WELL EXPLAINED ANSWERS LATEST
UPDATE JUST RELEASED THIS YEAR
Question: The malicious code attack includes the execution of viruses, worms, Trojan horses,
and active Web scripts with the intent to destroy or steal information.
_________________________
Select one:
True
False - CORRECT ANSWER✔✔True
Question: Packet munchkins use automated exploits to engage in distributed denial-of-service
attacks. _________________________
Select one:
True
False - CORRECT ANSWER✔✔False
, Page 2 of 189
Question: Acts of ____________________ can lead to unauthorized real or virtual actions that
enable information gatherers to enter premises or systems they have not been authorized to
enter.
Select one:
a.
theft
b.
security
c.
trespass
d.
bypass - CORRECT ANSWER✔✔c.
trespass
Question: Complete loss of power for a moment is known as a ____.
Select one:
a.
brownout
b.
fault
, Page 3 of 189
c.
lag
d.
blackout - CORRECT ANSWER✔✔b.
fault
Question: ____________________ are malware programs that hide their true nature, and
reveal their designed behavior only when activated.
Select one:
a.
Worms
b.
Trojan horses
c.
Spam
d.
Viruses - CORRECT ANSWER✔✔b.
Trojan horses
Q:A worm requires that another program is running before it can begin functioning.
, Page 4 of 189
Select one:
True
False - CORRECT ANSWER✔✔False
Question: Attacks conducted by scripts are usually unpredictable.
Select one:
True
False - CORRECT ANSWER✔✔False
Question: Hackers are "persons who access systems and information without authorization and
often illegally." _________________________
Select one:
True
False - CORRECT ANSWER✔✔True
Question: Microsoft acknowledged that if you type a res:// URL (a Microsoft-devised type of
URL) which is longer than ____________________ characters in Internet Explorer 4.0, the
browser will crash.
Select one:
a.