100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

ITEC 1010 CHAPTER 9 TEST QUESTIONS AND ANSWERS FULLY SOLVED LATEST UPDATE

Rating
-
Sold
-
Pages
12
Grade
A+
Uploaded on
10-09-2025
Written in
2025/2026

ITEC 1010 CHAPTER 9 TEST QUESTIONS AND ANSWERS FULLY SOLVED LATEST UPDATE 1. As the complexity of a network increases, the possibility of security breaches decreases. a. True b. False - Answers False 2. An attack that takes place before the security community and/or software developers become aware of and fix a security vulnerability is called the 'zero-day attack.' a. True b. False - Answers True 3. It is not uncommon for computer users to share their login ID and password with coworkers. a. True b. False - Answers True 4. Discovery of a vulnerability in a software program can potentially be sold to the government. a. True b. False - Answers True 5. You see a deceptive pop-up that says your computer is infected and that you must visit a compromised web site where you pay them to clean your computer. You have just become a victim of ransomware. a. True b. False - Answers True 6. Macro viruses are called so because they are written using a macro language. a. True b. False - Answers True 7. Even legitimate organizations sometimes use email spam for promoting products. a. True b. False - Answers True 8. Spam emails make up only a small proportion (<10%) of emails. a. True b. False - Answers False 9. Spam emails do not add to costs because nobody reads them anyways. a. True b. False - Answers False 10. There are bots that can sign up for thousands of email accounts. a. True b. False - Answers True 11. A zombie computer would send requests to access to the target site again and again. a. True b. False - Answers True 12. Educational institutions' Websites are the most commonly targeted sites by phishers a. True b. False - Answers False 13. When you receive a text message that there is a problem with your bank account and you are required you to click on a link to submit some information, you are likely seeing a vishing attack. a. True b. False - Answers False 14. Spear-phishing is when the phisher sends fraudulent emails to a certain organization's employees. a. True b. False - Answers True 15. The computer is running, but not responding to your keyboard inputs. You find that the network activities are running very slowly. You have probably been hit by a rootkit. a. True b. False - Answers True 16. Downloading games from unknown websites can be risky. The software may be a Trojan horse. a. True b. False - Answers True 17. You work at a call center of a large bank where you answer credit card services related questions from customers. Lately, you have noticed an increased number of customers enquiring if you had initiated a call. There can be a scam in progress. a. True b. False - Answers True 18. Transmitting a program, code, or command that causes harm to a computer is

Show more Read less
Institution
ITEC 1010
Course
ITEC 1010









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
ITEC 1010
Course
ITEC 1010

Document information

Uploaded on
September 10, 2025
Number of pages
12
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

ITEC 1010 CHAPTER 9 TEST QUESTIONS AND ANSWERS FULLY SOLVED LATEST UPDATE
2025-2026

1. As the complexity of a network increases, the possibility of security breaches decreases.

a. True

b. False - Answers False

2. An attack that takes place before the security community and/or software developers
become aware of and fix a security vulnerability is called the 'zero-day attack.'

a. True

b. False - Answers True

3. It is not uncommon for computer users to share their login ID and password with coworkers.

a. True

b. False - Answers True

4. Discovery of a vulnerability in a software program can potentially be sold to the government.

a. True

b. False - Answers True

5. You see a deceptive pop-up that says your computer is infected and that you must visit a
compromised web site where you pay them to clean your computer. You have just become a
victim of ransomware.

a. True

b. False - Answers True

6. Macro viruses are called so because they are written using a macro language.

a. True

b. False - Answers True

7. Even legitimate organizations sometimes use email spam for promoting products.

a. True

b. False - Answers True

8. Spam emails make up only a small proportion (<10%) of emails.

, a. True

b. False - Answers False

9. Spam emails do not add to costs because nobody reads them anyways.

a. True

b. False - Answers False

10. There are bots that can sign up for thousands of email accounts.

a. True

b. False - Answers True

11. A zombie computer would send requests to access to the target site again and again.

a. True

b. False - Answers True

12. Educational institutions' Websites are the most commonly targeted sites by phishers

a. True

b. False - Answers False

13. When you receive a text message that there is a problem with your bank account and you
are required you to click on a link to submit some information, you are likely seeing a vishing
attack.

a. True

b. False - Answers False

14. Spear-phishing is when the phisher sends fraudulent emails to a certain organization's
employees.

a. True

b. False - Answers True

15. The computer is running, but not responding to your keyboard inputs. You find that the
network activities are running very slowly. You have probably been hit by a rootkit.

a. True

b. False - Answers True
R182,49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached


Document also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TutorJosh Chamberlain College Of Nursing
Follow You need to be logged in order to follow users or courses
Sold
330
Member since
1 year
Number of followers
16
Documents
28211
Last sold
13 hours ago
Tutor Joshua

Here You will find all Documents and Package Deals Offered By Tutor Joshua.

3,6

53 reviews

5
18
4
14
3
12
2
0
1
9

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions