Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Gift of Fire Q5 1. In January 2000 Yahoo!, eBay, Amazon, E*Trade and other Web sites were shut down for several hours by what kind of attack? (a) Virus (b) Denial-of-service (c) Spyware (d) Worm 2. Which of the following is an example of biometrics: (a) DNA (b) Fingerprints (c) Voice prints (d) All of the above 3. Software that monitors incoming communications and filters out those that are from untrusted sites, or fit a profile of suspicious activity, is called: (a) A backdoor (b) A registry (c) An anonymizer (d) A firewall 4. In the early days of computing (1960's to the early 1970's), a "hacker" was: (a) An incompetent programmer who wrote programs that did not work properly (b) A busy programmer who reused code to save time (c) A creative programmer who wrote very elegant or clever programs (d) A new programmer who wrote simple programs 5. Dishonest sellers using online auction sites sometimes will bid on their own items to drive up the price. This practice is known as: (a) Shill bidding (b) Hidden bidding (c) Trap bidding (d) Decoy bidding 6. The hacker group that broke into the BellSouth computers in the late 1980's was known as: (a) The Legion of Doom (b) CyberPunks (c) The Operators (d) All of the above 7. Hacktivism is: (a) A political activist group promoting tougher anti-hacking laws (b) The counter-hacking techniques used by the FBI and other law enforcement agencies (c) The use of hacking to promote a political cause (d) A newsletter for hackers 8. Web sites that look attractive to hackers, but are closely monitored so that everything the hacker does at the site is recorded and studied are known as: (a) Honey pots (b) Digital surveillance (c) Computer Entrapment (d) Hacker crackdown 9. Collecting evidence from computer files and disks is called: (a) Digital investigation (b) Computer forensics (c) Technology forensics (d) Electronic investigation 10. Which of the following is NOT a malicious program used by hackers to gain access to your computer: (a) Key loggers (b) Remote Access Trojans (c) Bots (d) Honey pots