Introduction to Security
Personal Security
Computer Security
Internet Security
Privacy
100

Which of the following is a general term that refers to a wide variety of damaging or annoying software programs? 

A) Harmware

B) Malware

C) Bloatware

D) rashware

B) Malware

100

What are the three types of malware that have the primary traits of circulation and/or infection? 

A) viruses, Trojans, and worms

B) Trojans, spyware, and adware

C) viruses, spyware, and Trojans

D) worms, viruses and spyware

A) viruses, Trojans, and worms

100

Which type of malware exploits a vulnerability on one system and then immediately searches for another computer on the network that has the same vulnerability?

A) worm

B) virus

C) Trojan horse

D) mass-mailer

A) worm

100

Which of the following is a program advertised as performing one activity but actually does something else?

.

A) worm

B) rootkit

C) Trojan

D) virus

C) Trojan

100

What type of spyware silently captures and stores each keystroke that a user types on the computer's keyboard?

A) backdoor

B) worm

C) rootkit

D) keylogger

D) keylogger

200

An infected robot computer is known as a ____.

A) zombie

B) Trojan horse

C) beachhead

D) bottle

A) zombie

200

BONUS QUESTION WORTH DOUBLE

What security setting can cause a mobile device to erase installed apps and data if the passcode is incorrectly entered a number of times?

a.

A) extend the lockout period

B) reset to factory settings

C) remote wipe

D) remote lockout

B) reset to factory settings

200

On tablets and smartphones, what feature can be used that can erase the contents of the device if lost or stolen?

A) encryption

B) tracking

C) remote wipe

D) lock screen

C) remote wipe

200

Which of the following is NOT true about privacy? 

A) Privacy is the right to be left alone to the level that you choose.

B) Privacy of any level that you desire is easily achievable today.

C) Privacy is difficult due to the fact that Data is collected on almost all actions and transactions that individuals perform.

D) Privacy is the state or condition of being free from public attention to the degree that you determine.

B) Privacy of any level that you desire is easily achievable today.

200

Which of the following is a risk associated with the use of private data?

A) Constant use of encryption.

B) Malfunctioning hardware devices.

C) Associations with groups.

D) Statistical anomalies.

C) Associations with groups.

300

In a general sense “security” is _______.

A) only available on specialized computers

B) protection from only direct actions

C) the steps necessary to protect a person or property from harm

D) something that can relatively easy to achieve _____ ensures that only authorized parties can view

C) the steps necessary to protect a person or property from harm

300

Each of the following is a reason why it is difficult to defend against today’s attackers except _______.

A) faster detection of vulnerabilities

B) complexity of attack tools

C) user confusion

D) greater sophistication of attacks

B) complexity of attack tools

300

_____ ensures that only authorized parties can view the information.

A) Integrity

B) Confidentiality

C) Availability

D) Authorization

B) Confidentiality

300

A(n) _____ is a unique name for identification.

A) password

B) value

C) authentication

D) username

D) username

300

Which technique do attackers use today to uncover a password?

A) Online guessing

B) Offline cracking

C) Hash regeneration

D) Digest reproduction

B) Offline cracking

400

Each of the following is a password manager except:

A) password management application

B) password generator

C) online vault

D) hashing repository

D) hashing repository

400

Which malware locks up a user’s computer and then displays a message that purports to come from a law enforcement agency?

A) virus

B) ransomware

C) worm

D) Trojan

B) ransomware

400

Which statement regarding a keylogger is NOT true?

A) Software keyloggers are easy to detect.

B) Keyloggers can be used to capture passwords, credit card numbers, or personal information.

C) Hardware keyloggers are installed between the keyboard connector and computer keyboard USB port.

D) Software keyloggers can be designed to send captured information automatically back to the attacker through the Internet.

A) Software keyloggers are easy to detect.

400

Botnets are composed of _____.

A) Internet Relay Chat (IRC) instruments

B) zombies

C) herders

D) spam

B) zombies

400

_____ is an attack that sends unsolicited messages to Bluetooth-enabled devices.

A) Bluestealing

B) Bluejacking

C) Bluesending

D) Bluesnarfing

B) Bluejacking

500

BONUS QUESTION WORTH DOUBLE

Which type of malware is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as Trojans, viruses, or worms? 

A) virus

B) worm

C) hacking kit

D) rootkit

D) rootkit

500

BONUS QUESTION WORTH DOUBLE

What type of malware can, for example, locks up a user's computer and then display a message that purports to come from a law enforcement agency that states the user must pay a fine for illegal activity? 

A) zombie

B) adware

C) ransomware

D) logic bomb

C) ransomware

500

BONUS QUESTION WORTH DOUBLE

Botnets can flood a Web server with thousands of requests and overwhelm it to the point that it cannot respond to legitimate requests. What is this called? 

A) manipulating online polls

B) spamming

C) spreading malware

D) denying services

D) denying services

500

BONUS QUESTION WORTH DOUBLE

What security feature can you use to cause a mobile device to be completely locked for a period of time if the passcode is entered incorrectly a number of times?

A) Remote wipe

B) Reset to factory

C) Configure undiscoverable

D) Lockout period

D) Lockout period

500

BONUS QUESTION WORTH DOUBLE

What is it called if a user disables the built-in limitations on their Apple iOS device to provide additional functionality?

A) ROM swapping

B) remote lockout

C) jailbreaking

D) root logon

C) jailbreaking