ข้อสอบคอมพิวเตอรEcgi
Size:11410 Byte Create: 23/12/2547 Time: 17:11:17

A Few Review Questions for the Final Exam
1. CGI programs are written in this computer language.

a. PERL
b. Any Unix shell
c. any language that allows it to be executed on the system.
d. Visual Basic

2. CGI programs ______________.

a. are executable
b. need to reside in a special directory
c. are the equivalent of letting the world run a program on your system.
d. all of the above

3. As a security measure on Windows-based systems the Perl executable PERL.EXE
should ____________.

a. be in the cgi-bin directory
b. not be in the cgi-bin directory
c. not be allowed on the system
d. none of the above

4. A good password is ___________________.

a. the name of a family member
b. found in any dictionary
c. changed with some regularity
d. the name of the current month

5. As a security measure one should be aware of ____________.

a. bug fixes
b. patches
c. security announcements
d. all of the above

6. CGI scripts are __________________.

a. a security threat
b. programs that reside on a server and can be run from a Web browser.
c. easy to test for flaws
d. a and b

7. ____________ are macros that self-replicate.

a. Macro viruses
b. Boot sector viruses
c. Parasitic viruses
d. Class-D viruses

8. _____________ infect computers by modifying the contents of the boot sector
program.

a. Macro viruses
b. Boot sector viruses
c. Parasitic viruses
d. Class-D viruses

9. _______________ attach themselves to programs, also known as executables.

a. Macro viruses
b. Boot sector viruses
c. Parasitic viruses
d. Class-D viruses

10. A computer that has an active copy of a virus on its machine is considered
______________.

a. unusable
b. infected
c. a hoax
d. none of the above

11. Viruses can be hidden in ____________.

a. programs available on floppy disks or CDs
b. material downloaded from the web
c. email attachments
d. any of the above

12. If a virus attack has been made, ______________ will allow you to retrieve safe
copies of your files and software.

a. anti-virus software
b. system backups
c. user education
d. macros

13. Have ______________ software installed and updated regularly to detect, report and
(where appropriate) disinfect viruses.

a. anti-virus software
b. system backups
c. user education
d. macro

14. Inform all users that the risk of infection grows when people ______________.

a. exchange floppy disks
b. download web material
c. open email attachments without caution
d. all of the above

15. ______________ can be as disruptive as viruses themselves.

a. downloading from the Web
b. hoax virus warnings
c. chain letter emails
d. b and c

16. Viruses often use file types such as __________ to spread.

a. .EXE
b. .VBS
c. .JPEG
d. a and b

17. Some viruses attempt to disguise their true executable nature by using
______________.

a. CGI scripts
b. PERL scripts
c. double extensions
d. none of the above

18. It is a good idea to _____________.

a. keep your anti-virus software up to date
b. block any unwanted file types
c. make regular backups of important work and data
d. all of the above

19. There were at least ________ known computer viruses as of August, 2000.

a. 20,000
b. 40,000
c. 50,000
d. 70,000

20. ____________ is often used as a gateway to a legacy information system.

a. A CGI program
b. An HTTP server
c. the Internet
d. a router

21. __________ are by far the most popular type of anti-virus software used today.

a. Viewers
b Checksummers
c. Scanners
d. Security Bulletins

22. _________ is a computer virus which exploits e-mail.

a. A bootsector virus
b. BubbleBoy
c. Kakworm
d. b and c

23. A good anti-virus measure would be to use __________ to open e-mail attachments.

a. word
b. excel
c. viewers
d. a or b

24. ___________ plays a significant part in preventing infections by executable code
received by email.

a. Using micros
b. Block receiving/sending of executable code
c. User education
d. b and c

25. __________ contain detection/disinfection information for all known viruses.

a. Viewers
b Checksummers
c. Scanners
d. Heuristics

26. _____________ is a common virus entry point.

a. E-mail
b. The World Wide Web
c. A Floppy disk
d. all of the above

27. _________ rely on detecting change.

a. Viewers
b Checksummers
c. Scanners
d. Heuristics

28. ____________ is used to describe software which applies rules to distinguish viruses
from non-viruses.

a. Viewers
b Checksummers
c. Scanners
d. Heuristics

29. ____________ are the three main points where it makes sense to deploy anti-virus
software.

a. on the internet gateway, on the servers and on the desktop
b. on the internet gateway, on the servers and on floppy disks
c. on the internet gateway, on floppy disks and on the desktop
d. on the servers,on the desktop and on e-mail.

30. The effectiveness of anti-virus software in use today depends on ___________.

a. the World Wide Web
b. frequent updates
c. heuristics
d. checksummers

31. _________ files are directly executable under Windows.

a. .com
b. .exe
c. .doc
d. a and b

32. Although ______________ files may contain viruses or virus fragments that have
been copied from another application, they cannot themselves be infected.

a. JPEG
b. IDE
c. CLP
d. OBJ

33. ____________ files are add-on files for Sophos Anti-Virus which allow the product
to be updated quickly to detect and disinfect new viruses.

a. JPEG
b. IDE
c. CLP
d. OBJ

34.__________ files are not programs, and cannot be infected with a virus.

a. JPEG
b. IDE
c. CLP
d. OBJ

35. Like libraries, __________ files may be shared between multiple programs, so an
________ virus might find its way into several programs having infected only one file on
your disk.

a. JPEG, JPEG
b. IDE, IDE
c. CLP, CLP
d. OBJ, OBJ

36. A __________________ is a computer program that can spread across computers and
networks by making copies of itself, usually without the users knowledge.

a. boot-up sequence
b. computer virus
c. checksummer
d. none of the above

37. ___________ is a way a user can receive an infected file.

a. A jpeg file
b. An Internet download
c. An Mp3 file
d. all of the above

38. ______________ are programs that do things that are not described in their
specifications.

a. Worms
b. Trojan Horses
c. Parastic viruses
d. Macro viruses

39. ____________ do not need a carrier, but can use e-mail to forward themselves to
other users.

a. Worms
b. Trojan Horses
c. Parastic viruses
d. Macro viruses

40. _________ , also known as file viruses, attach themselves to programs (or
executables).

a. Worms
b. Trojan Horses
c. Parastic viruses
d. Macro viruses

41. __________ take advantage of commands that are embedded in files and run
automatically.

a. Worms
b. Trojan Horses
c. Parastic viruses
d. Macro viruses

42. ___________ are reports of non-existent viruses.

a. Worms
b. Trojan Horses
c. hoaxes
d. anti-virus reports

43. ____________ is an e-mail virus that adds text about the game of Scrabble to a
document if the minute and the day are the same when the document is opened.

a. Happy 99
b. Melissa
c. Concept
d. Love Bug

44. Probably the best known virus, this worm spread when the user opened an
attachment. It could steal user information and overwrite certain files.

a. Happy 99
b. Melissa
c. Concept
d. Love Bug

45. This virus was shipped accidently on official Microsoft software.

a. Happy 99
b. Melissa
c. Concept
d. Love Bug

46. This virus modifies the file wsock32.dll in the windows directory to include itself
along with any e-mail sent.

a. Happy 99
b. Melissa
c. Concept
d. Love Bug

47. The fastest way to spread a computer virus is through ____________.

a. CD Roms
b. e-mail
c. floppy disks
d. Internet downloads

48. _____________ is a way to defend against e-mail viruses.

a. Having a strict policy about e-mail attachments
b. Disabling Windows Scripting Host
c. Using anti-virus software
d. all of the above

49. _________ are generally safe. They are run by the browser in a secure environment
known as a 'sandbox'.

a. VBS scripts
b. Applets
c. Cookies
d. Java applications

50. ___________ threaten your confidentiality by enabling a website to remember your
details and keep track of your visits.

a. VBS scripts
b. Applets
c. Cookies
d. Java applications

51. A ____________ is a program that allows someone to take control of another user's
PC via the Internet.

a. backdoor trojan
b. macro virus
c. parasitic virus
d. boot sector virus

52. If you want to use the Internet safely, you should _____________.

a. have a separate network for internet machines
b. use firewalls
c. configure your Internet browser for security
d. all of the above

53. ___________ is a standard for low-power radio data communication over very short
ranges.

a. PDA
b. WAP
c. Bluetooth
d. Jini

54. ________ is technology to allow devices to exchange Java code.

a. PDA
b. WAP
c. Bluetooth
d. Jini

55. A good way to protect mobile devices is _____________ .

a. scanning at a gateway or during data transfer
b. do not give out your phone number
c. virus scanning on the mobile device
d. a and c

56. This class of computer virus can change its shape from replication to replication.

a. stealth
b. polymorphis
c. retro
d. slow

57. This class of computer virus slowly infects every file on the system.

a. stealth
b. polymorphis
c. retro
d. slow

58. This class of computer virus is a boot sector virus which can be detected by size, or
by reading the code.

a. stealth
b. polymorphis
c. retro
d. slow

59. This class of computer virus attacks anti-virus software.

a. stealth
b. polymorphis
c. retro
d. slow

60. When the called program does something different than expected this is considered a
___________ virus.

a. slow action
b. direct action
c. memory resident
d. polymorphic

61. This type of program virus provides a 'man in the middle attack'.

a. slow action
b. direct action
c. memory resident
d. polymorphic

62. The __________ keeps track of all free clusters on the system.

a. root directory
b. File Allocation Table (FAT)
c. Boot-strap program
d. none of the above

63. The _____________ loads the computer's operating system.

a. root directory
b. File Allocation Table (FAT)
c. Boot-strap program
d. none of the above

64. This class of computer viruses infect both boot records and program files, and use
both mechanisms to spread.

a. stealth
b. polymorphis
c. retro
d. multipartite

65. The most effective way to repair an infected Master Boot Record (MBR) is to use
___________.

a. scanners
b. the FDISK utility
c. reformat the hard drive
d. Internet downloads

66. ______________are a way for your browser to save information on your hard drive for
later retrieval.

a. trojan horses
b. worms
c. cookies
d. get requests

67. The 1-pixel by 1-pixel image that displays on the screen for the SYNC.GIF file is
sometimes called _____________.

a. clear GIFs
b. Web Bugs
c. invisible pixels
d. any of the above

68. The majority of cookies used on the Web are __________.

a. temporary
b. permanent
c. public information
d. chocolate chip