Download GOF Q5 - FSU Computer Science

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
Gift of Fire Q5
1. In January 2000 Yahoo!, eBay, Amazon, E*Trade and other Web sites were shut down
for several hours by what kind of attack?
(a) Virus
(b) Denial-of-service
(c) Spyware
(d) Worm
2. Which of the following is an example of biometrics:
(a) DNA
(b) Fingerprints
(c) Voice prints
(d) All of the above
3. Software that monitors incoming communications and filters out those that are from
untrusted sites, or fit a profile of suspicious activity, is called:
(a) A backdoor
(b) A registry
(c) An anonymizer
(d) A firewall
4. In the early days of computing (1960's to the early 1970's), a "hacker" was:
(a) An incompetent programmer who wrote programs that did not work properly
(b) A busy programmer who reused code to save time
(c) A creative programmer who wrote very elegant or clever programs
(d) A new programmer who wrote simple programs
5. Dishonest sellers using online auction sites sometimes will bid on their own items to
drive up the price. This practice is known as:
(a) Shill bidding
(b) Hidden bidding
(c) Trap bidding
(d) Decoy bidding
6. The hacker group that broke into the BellSouth computers in the late 1980's was known
as:
(a) The Legion of Doom
(b) CyberPunks
(c) The Operators
(d) All of the above
7. Hacktivism is:
(a) A political activist group promoting tougher anti-hacking laws
(b) The counter-hacking techniques used by the FBI and other law enforcement agencies
(c) The use of hacking to promote a political cause
(d) A newsletter for hackers
8. Web sites that look attractive to hackers, but are closely monitored so that everything the
hacker does at the site is recorded and studied are known as:
(a) Honey pots
(b) Digital surveillance
(c) Computer Entrapment
(d) Hacker crackdown
9. Collecting evidence from computer files and disks is called:
(a) Digital investigation
(b) Computer forensics
(c) Technology forensics
(d) Electronic investigation
10. Which of the following is NOT a malicious program used by hackers to gain access to
your computer:
(a) Key loggers
(b) Remote Access Trojans
(c) Bots
(d) Honey pots