Chapter 11 Exercise

  1. A _____ is a program that hides in a computer and
    allows someone from a remote location to take full
    control of the computer. (558)
    a. worm

b. rootkit

c. payload

d. cookie
2. Malware is a term that can be used to describe _____. (558)
a. worms

b. rootkits

c. back doors

d. all of the above

3. A _____ is an assault whose purpose is to disrupt computer
access to an Internet service such as the Web or e-mail. (562)
a. denial of service attack 

b. zombie

c. Trojan horse

d. virus hoax

4. _____ involves the examination of computer media,
programs, data and log files on computers, servers, and
networks. (569)
a. Encryption key 

b. E-mail filtering

c. Digital forensics

d. Trusted source

5. Physical access controls, such as locked doors and windows,
usually are adequate to protect against _____. (570)
a. software piracy

b. unauthorized access 

c. hardware theft  

d. all of the above

6. A(n) _____ is a programmed formula that the originator
of the data uses to encrypt the plaintext and the
recipient of the data uses to decrypt the ciphertext. (573)
a. botnet
b. certificate authority
c. encryption algorithm
d. encryption key

7. Some organizations continually review their _____,
which is a ratio that measures how much power enters
the computer facility, or data center, against the amount
of power required to run the computers. (583)
a. uninterruptible power supplies
b. public key encryption
c. ENERGY STAR program
d. power usage effectiveness (PUE)

8. As related to the use of computers, _____ is defined as
gaining unauthorized access or obtaining confidential
information by taking advantage of the trusting human
nature of some victims and the naivety of others. (590)
a. phishing 

b. pharming

c. social engineering  

d. a virus hoax


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s