22
Revision Mock Test Chapter 3, 4

Revision Mock Test Chapter 3, 4. 2 Q1 CounterSpy is a program that protects against ____. A.phishingC.spoofing B.sniffingD.spyware

Embed Size (px)

Citation preview

Revision

Mock Test

Chapter 3, 4

2

Q1

CounterSpy is a program that protects against ____.

A. phishing C. spoofing

B. sniffing D. spyware

3

Q2

____ is capturing and recording network traffic.

A. Phishing C. Spoofing

B. Sniffing D. Spyware

4

Q3

Hackers often use phishing to ____ information.

A. delete C. intercept

B. modify D. extort

5

Q4

____ attacks inundate a Web site or network with e-mails and other network traffic so that it becomes overloaded and can’t handle legitimate traffic.

A. Spam C. Identity theft

B. Denial-of-service D. Virus hoax

6

Q5

The most common way to index and link databases is using ____.

A. names C. Social Security numbers

B. Addresses D. driver’s license numbers

7

Q6

A(n) ____ is a set of rules specifying legal and ethical use of a system and activities and the consequences of noncompliance.

A. acceptable use policy C. keylogger

B. spam filter D. log file

8

Q7

____ are generated by Web server software, record a user’s actions on a Web site.

A. Viruses C. Logins

B. Spam D. Log files

9

Q8

You make two copies of a software package you just bought and sell one to a friend. This action is ____.

A. illegal and unethical C. legal but ethical

B. legal but unethical D. legal and ethical

10

Q9

With ____, you request data from a database by constructing a statement made up of query forms.

A. the database engine

B. query by example

C. select

D. structured query language

11

Q10

The ____ operator searches for records that don’t meet the condition.

A. NOT C. OR

B. AND D. MIS

12

Q11

Distributing data among multiple sites minimizes the effects of computer ____.

A. encapsulation C. fragmentation

B. replication D. failures

13

Q12

Accessing one central database server could increase ____ for remote users.

A. error rates C. productivity

B. communication costs D. processing speed

14

Q13

The ____ approach to setting up a distributed database addresses how tables are divided among multiple locations.

A. data-driven C. fragmentation

B. allocation D. replication

15

Q14

A(n) ____ database has the ability to represent more complex data relationships than a relational database.

A. data-driven C. client/server

B. object-oriented D. distributed

16

Q15

Grouping objects along with their attributes and methods into a class is called ____.

A. replication C. encapsulation

B. Inheritance D. distributed processing

17

Q16

Consider the following process ‘Compute’: It has INPUT: grossPay data Have OUTPUTS: grossPay, overTimePay and

nettPay

18

Q16 (cont.)

The process description is:

IF grossPay > 5000 THEN overTimePay = 100

ELSE

overTimePay = 0

ENDIF

19

Q16 (cont.)

Which statement is TRUE?

A. The above is a process with unnecessary data input

B. A process with an impossible output

C. The above is NOT a process

D. The above is not complete, storage is absent

E. None of the above

20

Q17

21

Q17 (cont.)

A. The system performance standard for a manufacturing process is to provide no more than 1% defective parts

B. The productivity per day must keep the output % within the range of 1% of the defective parts

C. The return on investment (ROI) of the defective parts per day produce must be below 1% D. None of the above

22