Copyright

Computer Threats & Security Chapter Exam

Exam Instructions:

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Page 1

Question 1 1. Explain how an individual can protect their computer from phishing scams.

Question 2 2. A computer virus is one type of _____.

Question 3 3. What is an example of an occurrence for which the disaster recovery policy would be needed?

Question 4 4. Which of the following is a motivator for an organization to create a computer security policy?

Question 5 5. Which virus groups computers together to create a network?

Page 2

Question 6 6. Which of the following is NOT a way to protect your computer from a virus?

Question 7 7. A tell-tale sign a website visitor have been mousetrapped is _____.

Question 8 8. Mousetrapping poses a serious security risk, especially when _____.

Question 9 9. Which one of the following can remotely wipe lost or stolen laptops and computers?

Question 10 10. Computer security is fundamentally about which one of the following?

Page 3

Question 11 11. Which of these options contains a primary objective of a DoS or DDoS attack?

Question 12 12. Which of these options contains the three basic target categories for a DoS or a DDoS?

Question 13 13. What is the difference between a 'white hat' and 'grey hat' hacker?

Question 14 14. What are the three different types of hackers?

Question 15 15. Which of the following is the purpose of a firewall access policy?

Page 4

Question 16 16. Live threat-intelligence helps the firewall to identify and stop _____.

Question 17 17. A phishing attack that incorporates personal information about the user is known as which of the following?

Question 18 18. Which of the following describes a technological response to phishing attacks?

Question 19 19. Should the strictest possible security controls be put in place for every computer system?

Question 20 20. What is the BEST way to ensure that computer security controls continue to perform their function?

Page 5

Question 21 21. Which of the following are NOT a method to deliver network security?

Question 22 22. If you are using administrative policies to enhance your network security, which of the following would you NOT be doing?

Question 23 23. Which of the following presents a security concern when using the Internet but also provides certain benefits to users?

Question 24 24. Which of the following policies is NOT specifically associated with remote access?

Question 25 25. Asymptomatic means a virus _____

Page 6

Question 26 26. _____ are NOT a definite indication of a mousetrapping website.

Question 27 27. Which one of the following refers to the use of guarding actual computing hardware from unauthorized access?

Question 28 28. Which of these options properly defines both a DoS and a DDoS attack?

Question 29 29. Which is considered the 'ethical' hacker?

Question 30 30. What is the maximum number of zones that can be associated to a firewall?

Computer Threats & Security Chapter Exam Instructions

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Computer Science 103: Computer Concepts & Applications  /  Computer Science Courses
Support