The thing that eventually terminates a worm virus is a lack of:
(A) Memory or disk space.
(B) Time.
(C) CD drives space.
(D) CD-RW.
What type of virus uses computer hosts to reproduce itself
(A) Time bomb
(B) Worm
(C) Melissa virus
(D) Macro virus
In 1999, the Melissa virus was a widely publicised:____________
(A) E-mail virus.
(B) Macro virus.
(C) Trojan horse.
(D) Time bomb.
An intentionally disruptive program that spreads from program to program or from disk to disk is known as a_____________
(A) Trojan horse.
(B) Virus.
(C) Time bomb.
(D) Time-related bomb sequenc
A program that performs a useful task while simultaneously allowing destructive acts is a___________
(A) Worm.
(B) Trojan horse.
(C) Virus.
(D) Macro virus
Malicious software is known as____________
(A) Badware.
(B) Malware.
(C) Maliciousware.
(D) Illegalware
Collecting personal information and effectively posing as another individual is known as the crime of_____________
(A) Spooling.
(B) Identity theft.
(C) Spoofing.
(D) Hacking.
The common name for the crime of stealing passwords is____________
(A) Jacking.
(B) Identity theft.
(C) Spoofing.
(D) Hacking.
The typical computer criminal is a(n)____________
(A) Young hacker.
(B) Trusted employee with no criminal record.
(C) Trusted employee with a long, but unknown criminal recor
(D)
The computer abbreviation KB usually means____________
(A) Key Block
(B) Kernel Boot
(C) Kilo Byte
(D) Kit Bit