Professional Documents
Culture Documents
Quiz - CS3001 ch3
Quiz - CS3001 ch3
……………………………………………………………………………
Student ID :
…………………………………………………………………………………
.
Quiz 1-CS3001
Q1 Please choose the correct answer and fill up in the below table (5 points)
Q# 1 2 3 4 5 6 7 8 9 10
Answer b b b a/e b e a b d c
1- A harmful program that resides in the active memory of a computer and duplicates itself.
a) virus
b) worms
c) RootKit
d) None of the above
3- The abuse of email systems to send unsolicited emails to a large number of groups is called:
a) CAN-SPAM
b) SPAM
c) Smishing
d) Phishing
6- Perpetrators include:
a) Thrill seekers wanting a challenge
b) Common criminal looking for financial gain
c) Industrial spies trying to gain an advantage
d) None of the above
e) All of the above
7- The use of illegal means to obtain business information, which is not available to the public.
a) Industrial espionage
b) Hacktivism
c) Neither A nor B
d) Both A and B