DIFFICULTY LEVEL : MODERATE
1. What type of accountants may recommend controls for an organization’s computer systems?
a) External accountant
b) Public accountant
c) Internal accountant
d) Private accountant
2. When sending an e-mail, the __________ line describes the contents of the message.
a) subject
b) to
c) CC
d) contents
3. The __________ of a threat measures its potential impact on a system.
a) countermeasures
b) susceptibility
c) vulnerabilities
d) degree of harm
4. A __________ organizes the web into categories.
a) archive
b) directory
c) encyclopedia
d) search engine
5. To create a copy of files in the event of system failure, you create a __________.
a) redundancy
b) firewall
c) backup
d) restore file
6. A word in a web page that, when clicked, opens another document.
a) URL
b) reference
c) anchor
d) Hyperlink
7. In the right setting a thief will steal your information by simply watching what you type.
a) shoulder surfing
b) social engineering
c) snagging
d) spying
8. News servers utilize __________ to distribute documents to readers.
a) HTTP
b) FTP
c) NNTP
d) NEWS
9. MCI and AT&T are examples of which of the following?
a) Mobisodes
b) Internet service providers
c) Social networks
d) Communications systems
10. You can organize your bookmarks using __________.
a) folders
b) menus
c) icons
d) structures