Title: What is the PRIMARY use of a password
1(No Transcript)
2List these computer-related films in order of
release beginning with the oldest.
A. The Computer Wore Tennis Shoes
70 B. Sneakers 92 D The Net
95 C Independence Day 96
- The Computer Wore Tennis Shoes
Sneakers
The Net
Independence Day
3Founding Fathers of the Internet include all of
the following except whom?
Al Gore
Leonard Kleinrock
Lawrence Roberts
4Which is not a known computer virus?
ULUVME
Stealth
Nasty
5The video, Sherman On My Mind deals with
computer misuse, but does not include which of
the following infractions?
- Operating an Outside Business
Software Piracy
Participating in gambling, lotteries, and betting
pools
Downloading of pornography to an office computer
system
6Which of these is a good laptop security practice?
Store It in the Overhead Bin on Airplanes
- Use an Obvious Carrying Bag
Dont Encrypt or Backup Your Data on the Hard
Drive
Never, Ever, Check Your Laptop at the Airport
7To whom should virus warnings from relatives or
friends be immediately forwarded or reported?
Tom Nemmers
The Help Desk
PC Support
8Back Up Copies of Files Should Not Be Made to
Which Media?
Paper
Network Servers
Diskettes
9Which Is Not a Ramification If Caught for
Software Piracy?
Steep Fines
Savings to the Department Budget
Jail Terms
10Which of these viruses was not identified in
1999?
Pretty Park
Chernobyl
Ethan
11Personal firewall protection products are most
useful to which of the following users?
Laptop Toters
SecurID Users
Cable Modem DSL Users
12Studies have shown that 75 of all passwords can
be guessed in how many guesses?
100
50
10,000
13Which of these is not a descriptor of an Email
message?
- Not Small Talk --its a Document
Not Like a Sticky Note --its like a Memo
Evidence in Digital Discovery
Not Personal Property
14What is the term for the technique where
attackers can lie about their identity and
location on the network?
Denial of Service
Hacking
Digital Signature Deception (DSD)
15Name the 1995 movie, starring Cindy Crawford,
where the encryption algorithm of bank
transactions going through an undersea pipeline
had to be cracked?
Frantic
Future World
Fair Game
16Which of these is not a Single Key Encryption
Method?
Triple DES
Skipjack
Double DES
17The 10 most common viruses cause what percentage
of all virus infections?
- 0 - All Are Autodeleted by McAffee
95
75
30