How is a computer virus like the flu virus?
a. It has a yearly season
b. Everyone gets infected by one eventually
c. It spreads within a host
d. It requires treatment by a professional
A typical 1950s computer probably would be unable to:
a. Calculate the volume of a lake
b. Connect to a network
c. Help determine the speed of the Earth's spin
d. Process sales date
(b) Connect to a network
What is the best way to protect a smart phone from worms?
a. Don't connect it to an unknown wireless network
b. Don't answer calls from unknown numbers
c. Don't install any apps
d. Don't use it to browse the internet
(a) Don't connect it to an unknown wireless network
Which of the following people would most likely be described as a "black hat?"
a. A hacker who gathers credit card information
b. A person who teachers herself to code
c. A student programmer who snuck around MIT in the sixties.
d. A programmer who designs web sites anonymously
(a) A hacker who gathers credit card information
This is a university in Cambridge, Massachusetts that can be considered the birthplace of hacking
a. Harvard
b. Yale
c. MIT (Massachusetts Institute of Technology)
d. Brookdale
What is the most likely reason for an antivirus software update?
a. A worm has gotten into the antivirus network
b. A scam text message appears on your phone
c. A suspicious email arrives in your inbox
d. A new spyware worm is going around
(d) A new spyware worm is going around
What new feature did the PDP-1 have that made Spacewar! possible?
a. A hard drive
b. A full-sized keyboard
c. A laser printer
d. A graphic display
(d) A graphic display
Which of the following is an example of a payload?
a. A suspicious file attachment
b. A wireless network of home appliances
c. A keyboard recording program
d. An expensive antivirus software
(c) A keyboard recording program
Why might a bank hire a "white hat?"
a. To design an easier to use phone app
b. To calculate their projected profits for the upcoming year
c. To teach their employees how to better use the internet
d. To protect their database from unauthorized access
(d) To protect their database from unauthorized access
This was a famous computer worm that went around in May, 2000 that looked like it was coming from a friend or family member and caused more than $5 billion in damages:
a. WannaCry
b. ILOVEYOU
c. Brain
d. Melissa
(b) ILOVEYOU
Which of the following is true of any malware?
a. It is a damaging program
b. It is a kind of virus
c. It will expose your most private files
d. You have to download it
(a) It is a damaging program
Phone phreakers were driven mainly by:
a. Curiosity
b. Greed
c. Selflessness
d. Competetiveness
(a) Curiosity
Your desktop gets cluttered with pop-up windows whenever you launch a browser. Your device is infect with:
a. Spyware
b. Ransomware
c. Adware
d. Popware
(c) Adware
Which literary character would hacktivists most likely compare themselves to?
a. Cinderella
b. Robin Hood
c. The Wicked Witch
d. The Big Bad Wolf
(b) Robin Hood
Student hackers at MIT turned a building in Cambridge into a giant version of this game:
a. Super Mario Bros.
b. Pac-Man
c. Wreck-It Ralph
d. Tetris
(b) Pac-Man OR (d) Tetris
Trojan horses typically infect a device through:
a. Photos on social media
b. Text messages
c. Online chats
d. Downloads or attachments
(d) Downloads or attachments
Which word best describes the Homebrew Club of the early 1970s?
a. Political
b. Hobbyists
c. Academic
d. Philanthropic
(b) Hobbyists
Which piece of personal information would be most valuable to a malware developer?
a. Your favorite social media site
b. Your first name
c. Your shoe size
d. Your friend's email address
(d) Your friend's email address
Which of these statements is most accurate?
a. Hackers include only those who steal and vandalize
b. Hacking can be constructive or destructive
c. Only white hats are true hackers
d. The difference between white and black hats is a matter of opinion
(b) Hacking can be constructive or destructive
This was a bug in computer programs that people thought would end the world on New Year's Eve 1999:
a. Spam 4000 bug
b. ILOVEYOU bug
c. Slammer bug
d. Y2K bug
(d) Y2K bug
How are worms different from Trojan horses?
a. Worms enter a device via an email attachment
b. Worms can spread on their own
c. Worms hide from the user
d. Worms delete files
(b) Worms can spread on their own
ARPANET was built to help people do things like:
a. Sort through census data
b. Move troops around the country
c. Track the movement of different galaxies
d. Connect with friends all over the world
(b) Move troops around the country
An email from an unfamiliar address says, "Hi! It's me! Click this link to add me on Facebook." What is the first thing you should do?
a. Delete the email
b. Reply to ask who the sender is
c. Forward it to your friends to ask them about it
d. Click on the link
(a) Delete the email
Hackathons are events in which:
a. Black hats work on ways to break into systems
b. White hats trade ideas on improving system security
c. Hacktivists spread their message to media outlets
d. Programmers test their skill through competition
(d) Programmers test their skill through competition
What was phone hacker Kevin Poulson's nickname:
a. Dark Dante
b. Steve the Shadow
c. Evil Eric
d. Joe
(a) Dark Dante