Professional Documents
Culture Documents
Chapter 3-Quiz
Chapter 3-Quiz
1. It is the computer’s control program. It allows users and their applications to share and access common
computer resources, such as processors, main memory, databases, and printers.
a. Operating System
b. Auditing System
c. Security System
d. None of the above
3. It is a type of DOS Attack that uses numerous intermediary computers to flood the target computer with
test messages, “pings” causing network congestion.
a. SYN Flood Attack
b. Smurf Attack
c. Heart Attack
d. Distributed Denial of Service Attack
6. Rules and standards governing design of hardware and software that permit network users to
communicate and share data
a. Protocols
b. Internet Address
c. Intranet Technologies
d. Internet Technologies
9. It is a program that attaches itself to a legitimate program to penetrate the operating system and
destroy programs, files and operating system itself.
a. Worm
b. Virus
c. Trojan Horse
d. Logic Bomb
10. What was originally developed for the US Military and later became used widely for academic and
government research
a. Intranet
b. World Wide Web
c. Internet
d. Extranets