Computer Science/Information System 101 - Introduction to Computer Information » Summer 2021 » Chapter 9 Quiz

Need help with your exam preparation?

Question #1
Which type of program would likely be used by investigators to record a potential suspects' Internet activities?
A.   Global positioning system
B.   Cookie
C.   Keylogger
D.   Web bug
Question #2
This law gives you the right to look at your personal records held by government agencies.
A.   Family Educational Rights and Privacy Act
B.   Computer Fraud and Abuse Act
C.   Gramm-Leach-Bliley Act
D.   Freedom of Information Act
Question #3
________ are programs that migrate through networks and operating systems and attach themselves to various other programs and databases.
A.   Zombies
B.   DoS
C.   Viruses
D.   Web bugs
Question #4
Rogue Wi-Fi hotspots imitate free hotspots and capture information, such as usernames and passwords, sent by users to legitimate sites.
A.   TRUE
B.   FALSE
Question #5
Spyware is alarmingly common on laptops and desktops, but recent spyware is designed to work on other types of computers, such as iOs and Android cell phones.
A.   TRUE
B.   FALSE
Question #6
________ are used by advertising companies to keep track of your web activity as you move from one site to the next.
A.   Sniffers
B.   First-party cookies
C.   Keyloggers
D.   Third-party cookies
Question #7
The most common protocol for website encryption is https (Hypertext Transfer Protocol Secure).
A.   TRUE
B.   FALSE
Question #8
As a security buffer, all electronic communications coming into and leaving a corporation must be evaluated by the ________.
A.   loss prevention team
B.   firewall
C.   disaster recovery plan
D.   encryption device
Question #9
A deceptive act, using the Internet, to trick people into spending their money and time for no gain is called an Internet ________.
A.   worm
B.   cookie
C.   scam
D.   malware
Question #10
A(n) ________ Wi-Fi hotspot imitates a legitimate free Wi-Fi hotspot in order to capture personal information.
A.   viral
B.   worm
C.   rogue
D.   phishing

Need help with your exam preparation?