171. The thing that eventually terminates a worm virus is a lack of:
A. Memory or disk space
B. Time
C. CD drive space
D. CD-RW
172. When a logic bomb is activated by a time related event, it is known as a:
A. Time-related bomb sequence
B. Virus
C. Time bomb
D. Trojan horse
173. A logic bomb that was created to erupt on Michelangelo’s birthday is an example of a: A. Time-related bomb sequence
A. Time-related bomb sequence
B. Virus
C. Time bomb
D. Trojan horse
174. What is the name of an application program that gathers user information and sends it to someone through the Internet?
A. A virus
B. Spybot
C. Logic bomb
D. Security patch
175. Standardization of Microsoft programs and the Windows operating system has made the spread of viruses:
A. More complicated
B. More difficult
C. Easier
D. Slower
176. HTML viruses infect:
A. Your computer
B. A Web page in the HTML code
C. Both a Web page and the computer that is viewing it.
D. None of these
177. Software programs that close potential security breaches in an operating system are known as:
A. Security breach fixes
B. Refresh patches
C. Security repairs
D. Security patches
178. When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as:
A. A virus
B. A Trojan Horse
C. Cracking
D. A denial of service attack.
179. __________ is the measurement of things such as fingerprints and retinal scans used for security access
A. Biometrics
B. Bio-measurement
C. Computer security
D. Smart weapon machinery
180. What is the most common tool used to restrict access to a computer system?
A. User log in
B. Passwords
C. Computer keys
D. Access-control software
