1. A __________ is anything that can cause harm.
A) vulnerability
B) phish
C) threat
D) spoof
2. In the right setting a thief will steal your information by simply watching what you type.
A) snagging
B) spying
C) social engineering
D) shoulder surfing
3. A __________ is a small program embedded inside of a GIF image.
A) web bug
B) cookie
C) spyware application
D) spam
4. A hacker contacts you my phone or email and attempts to acquire your password.
A) spoofing
B) phishing
C) spamming
D) bugging
5. This power protection device includes a battery that provides a few minutes of power.
A) surge suppressor
B) line conditioner
C) generator
D) UPS
6. The phrase __________ describes viruses, worms, Trojan horse attack applets, and attack scripts.
A) malware
B) spam
C) phish
D) virus
7. A hacker that changes or forges information in an electronic resource, is engaging in __________.
A) denial of service
B) sniffing
C) terrorism
D) data diddling
8. Hackers often gain entry to a network be pretending to be at a legitimate computer.
A) spoofing
B) forging
C) IP spoofing
D) ID theft
9. The __________ of a threat measures its potential impact on a system.
A) vulnerabilities
B) countermeasures
C) degree of harm
D) susceptibility
10. The power level drops below 120V.
A) brownout
B) spike
C) blackout
D) surge
ANSWERS:
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
C | D | A | B | D | A | D | C | C | B |
Post a Comment
0 Comments