Quiz Answer
Quiz Answer
a) harmful
b) done over the internet and cell phone
c) against the law
d) all of above
________________________________________
2: plagiarism is
a) bundle of rights.
b) hidden inside of a program.
c) using someone else's information as your own.
d) none of the above
________________________________________
3: Trojans is
a) a computer program that is designed to cause trouble in your computer
b) protection from bullying
c) is a person or company who own exclusive rights of the original work.
d) none of the above
________________________________________
4: Viruses
a) destroys computer files.
b) hurts someone through cell phone.
c) protects people from cyber bullying
d) none of the above
________________________________________
5: Worms can
a) stealing ideas from computers
b) multiply over and over again.
c) All the above
d) none of the above
________________________________________
6: Copy right is
a) owned by a person or company
b) gives protection to the author and creator of original work.
c) bundle of rights
d) all the above
________________________________________
7: Which of these can be done over the chat rooms, text messaging/text, virtual?
a) Trojans
b) Cyber bullying
c) Viruses
d) Copy right infringements
e) All the above
________________________________________
8: Which of these is protectable under the copy right law?
a) a professional worker
b) a dog
c) original work
d) A and b
________________________________________
9: Which of these causes depression?
a) Viruses
b) Trojans
c) Cyber bullying
d) none of the above
________________________________________
10: Which of these can be found on the internet?
a) plagiarism/trojans
b) viruses/worms
c) original work
d) A and B
11: Which of the following is a computer program designed to secretly invade systems and either modify the way in which
they operate or alter the information they store?
a) Computer virus
b) Software piracy
c) Malware
d) Spam
12: Which of the following is the unauthorized duplication of software or the illegal transfer of data from one storage
medium to another?
a) Computer virus
b) Software piracy
c) Malware
d) Spam
13: Which of the following is unsolicited commercial bulk email whose primary purpose is the commercial advertisement
or promotion of a commercial product or service?
a) Cyberterrorism
b) Terrorism
c) Spam
d) Malware
15.Which of the following is an example of biometrics:
a) DNA
b) Fingerprints
c) Voice prints
d) All of the above
16.In the early days of computing (1960's to the early 1970's), a "hacker" was:
a) An incompetent programmer who wrote programs that did not work properly
b) A busy programmer who reused code to save time
c) A creative programmer who wrote very elegant or clever programs
d) A new programmer who wrote simple programs
17.Hacktivism is:
a) A political activist group promoting tougher anti-hacking laws
b) The counter-hacking techniques used by the FBI and other law enforcement agencies
c) The use of hacking to promote a political cause
d) A newsletter for hackers
18.Web sites that look attractive to hackers, but are closely monitored so that everything the hacker does at the site is
recorded and studied are known as:
a) Honey pots
b) Digital surveillance
c) Computer entrapment
d) Hacker crackdown
19.Which of the following is NOT a program used by hackers to gain access to your computer:
a) Keyloggers
b) Trojans
c) Rootkits
d) Honey pots
Essay Questions
a. Briefly define identity theft.
b. Describe two techniques criminals can use to gather the information they need to steal an identity.
c. Describe two ways a person can protect their identity.
d. Describe two ways a business can protect its customers from identity thieves.
Matching Questions
phishing an attack in which hackers overload a target site with requests for information.
pharming hacking to promote a political cause
honey pots Web sites that are specifically designed to be attractive to hackers
hactivism planting false Internet addresses in the tables on a Domain Name Server (DNS) so
that when someone types a URL, they are re-directed to a bogus site
denial-of-service (DOS) sending millions of emails fishing for information to use to impersonate someone
and steal money or goods