Home > Articles > Certification > Other IT

  • Print
  • + Share This
This chapter is from the book

Chapter Review Questions

Question 2-1

Which of the following are types of security risks? Select all that apply.

  1. Adware

  2. Dialers

  3. Hack tools

  4. Joke programs

  5. Spyware

Question 2-2

Spyware can impact computer performance and security in which of the following ways? Select all that apply.

  1. Overwhelming computer capacity

  2. Wasting time

  3. Displaying graphic content

  4. Harvesting sensitive data

  5. Weakening computer security

  6. Causing programs to fail

Question 2-3

What are some of the ways that computers can be protected from threats and security risks? Select all that apply.

  1. Update software regularly 

  2. Run unknown applications received via email

  3. Make use of a firewall application 

  4. Make use of an antispyware application

Question 2-4

Which of the following best describes a virus? Select the best answer from those provided.

  1. A malicious program capable of spreading itself automatically

  2. A malicious program that makes use of many different vectors of transmission

  3. A malicious program that usually requires user interaction to spread

  4. An application that provides some form of desirable functionality while also performing other undesirable tasks hidden from the user

Question 2-5

Which type of virus can execute before an operating system is loaded? Select the best answer from those provided.

  1. Macro virus 

  2. File virus

  3. Boot-sector virus

  4. Blended threat

Question 2-6

A blended threat is what type of program? Select the best answer from those provided.

  1. Both a virus and a worm

  2. A program that can change itself during replication

  3. A program that spreads using many different methods and techniques

  4. A program capable of targeting only a single operating system

  5. Both a virus and a Trojan horse

Question 2-7

Which of the following best describes a worm? Select the best answer from those provided.

  1. A program capable of spreading itself automatically

  2. A program that makes use of many different vectors of transmission 

  3. A program that usually requires user interaction to spread

  4. A program that provides some form of desirable functionality while also performing other undesirable tasks hidden from the user

Question 2-8

Why do worms impact an organization much more than most viruses? Select the best answer from those provided.

  1. Worms can spread by many different means.

  2. Viruses automatically replicate themselves.

  3. Worms can relay data without the user's knowledge.

  4. Worms automatically replicate themselves.

Question 2-9

Which of the following best describes a Trojan horse? Select the best answer from those provided.

  1. A malicious program capable of spreading itself automatically

  2. A malicious program that makes use of many different vectors of transmission

  3. A malicious program that usually requires user interaction to spread

  4. An application that provides some form of desirable functionality while also performing other malicious tasks hidden from the user

  • + Share This
  • 🔖 Save To Your Account