1. The computers in a lab on a floor of a building would be connected using a ________.
2. A(n) ________ server is a heavily secured server located between a company's secure internal network and its firewall.
- armored
- transitional
- proxy
- bastion host
3. A _______ is a virus triggered on a certain date.
- time bomb
- logic bomb
- worm
- macro
4. DRM-free music can be moved legally from system to system.
True
False
5. Which of the following is NOT a common network topology?
- Cluster
- Linear bus
- Star
- Ring
6. Every new cell/smartphone has to include a GPS chip.
True
False
7. Which of the following uses radio waves to transmit data signals over short distances?
- Infrared
- Bluetooth
- Wireless access protocol
- VoIP
8. Which of the following is NOT a virus category?
- Macro
- Pharming
- Worm
- Logic bomb
9. Many mobile devices include a mini- ________ port.
- serial
- coaxial
- USB
- parallel
10. The Spyeye Mobile Banking virus tricks users into downloading an infected file to their phones, which enables theft of online banking information.
True
False
11. With regard to computer protection, quarantining is defined as ________.
- deleting an infected file
- updating your antivirus software
- repairing an infected file
- placing a found virus in a secure area on the hard drive
12. A(n) ________ server tracks who is logging onto the network as well as which services on the network each user has available.
- application
- authentication
- file
- dedicated
13. A power failure interrupts VoIP service.
True
False
14. Since data transmissions can pass through fiber-optic cable in only one direction, transmission of data in both directions requires at least two fibers.
True
False
15. A ________ is a virus attached to documents such as Word or Excel files.
- Trojan horse
- script virus
- macro virus
- polymorphic virus
16. ________ viruses are often transmitted by a flash drive left in a USB port.
- Macro
- Boot-sector
- Time-bomb
- Logic-bomb
17. A main difference between the tablet and the smartphone is the ________.
- touch-screen interface
- Internet connectivity
- screen size
- operating system
18. Ethical hackers are also known as white-hat hackers.
True
False
19. CAPTCHA is ________.
- a rootkit virus
- password method
- antivirus software
- the wavy hard-to-read letter and number sequence you type to prove you are human to a Web site
19. Which of the following classifications of viruses can change its own code to avoid detection?
- Stealth
- Worm
- Polymorphic
- Multipartite
20. A print server uses a print ________ as a software holding area for jobs waiting to be printed.
- heap
- stack
- spooler
- logger
21 A tablet uses a full traditional operating system.
True
False
22. Data flows in both directions in a ring network.
True
False
23. 4G LTE Cellular networks offer faster data-transfer speed than Wi-Fi offers.
True
False
24. A virus signature is a portion of virus code unique to a particular computer virus.
True
False
25. Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
- pretexting
- theft
- pharming
- engineering
26. All of the following were top cybercrimes reported to the IC3 EXCEPT ________.
- identity theft
- non-auction scam
- theft of services
- advance fee fraud
27. Which of the following describes the number of times an analog wave is measured each second during an analog-to-digital conversion?
- Conversion rate
- Converting rate
- Simplifying rate
- Sampling rate
28. Ring networks use the ________ method to avoid data collisions.
- active-check
- passive-check
- token
- packet screening
29. The distance between two near field communication (NFC) devices is limited to about ________.
30. Transmission media comprise the physical system data takes to flow between devices on the network.
True
False
31. Text messaging is also called ________.
- short text messaging (STM)
- text messaging system (TMS)
- sending messages shortly (SMS)
- short message service (SMS)
32. ________ allows only limited use of legally purchased media.
- Copyright
- Copyleft
- Synchronizing
- Digital rights management
33. The terms virus and worm actually mean the same thing.
34. ________ hackers break into systems for nonmalicious reasons such as to test system security vulnerabilities.
- White-hat
- Black-hat
- Gray-hat
- Green-hat
35. Which of the following digital image formats compresses the image file?
36. A ________ is named after a housing construction feature that slows the spread of fires from house to house.
- firewall
- fire extinguisher
- firehouse
- firebreak
37. The primary input devices for smartphones are ________.
- microphone and touch screen
- touch screen and digital camera
- keyboard and mouse
- microphone and mouse
38. A macro virus is a virus attached to a file such as a Word document or Excel workbook.
True
False
39. SMS technology sends both text and pictures.