1. A __________ is anything
that can cause harm.
A)
vulnerability
B)
phish
C)
threat
D)
spoof
2. In the right setting a
thief will steal your information by simply watching what you type.
A)
snagging
B)
spying
C)
social engineering
D)
shoulder surfing
3. A __________ is a small
program embedded inside of a GIF image.
A)
web bug
B)
cookie
C)
spyware application
D)
spam
4. A hacker contacts you my
phone or email and attempts to acquire your password.
A)
spoofing
B)
phishing
C)
spamming
D)
bugging
5. This power protection
device includes a battery that provides a few minutes of power.
A)
surge suppressor
B)
line conditioner
C)
generator
D)
UPS
6. The phrase __________
describes viruses, worms, Trojan horse attack applets, and attack scripts.
A)
malware
B)
spam
C)
phish
D)
virus
7. A hacker that changes or
forges information in an electronic resource, is engaging in __________.
A)
denial of service
B)
sniffing
C)
terrorism
D)
data diddling
8. Hackers often gain entry to
a network be pretending to be at a legitimate computer.
A)
spoofing
B)
forging
C)
IP spoofing
D)
ID theft
9. The __________ of a threat
measures its potential impact on a system.
A)
vulnerabilities
B)
countermeasures
C)
degree of harm
D)
susceptibility
10. The power level drops
below 120V.
A)
brownout
B)
spike
C)
blackout
D)
surge
ANSWERS:
1
|
2
|
3
|
4
|
5
|
6
|
7
|
8
|
9
|
10
|
C
|
D
|
A
|
B
|
D
|
A
|
D
|
C
|
C
|
B
|
0 Comments