Exam 22: Understanding Firewalls
Exam 1: Technology Impacts16 Questions
Exam 2: Understanding Bits and Bytes21 Questions
Exam 3: Doing Business Online16 Questions
Exam 4: Choosing Software18 Questions
Exam 5: Starting the Computer: the Boot Process16 Questions
Exam 6: Evaluating Your Cpu and Ram19 Questions
Exam 7: Understanding Networking17 Questions
Exam 8: Managing Digital Media13 Questions
Exam 9: Threats to Your Digital Life20 Questions
Exam 10: Understanding Software Programming17 Questions
Exam 11: Using Databases18 Questions
Exam 12: Using Servers15 Questions
Exam 13: Understanding Ip Addresses, Domain Names, and Protocols17 Questions
Exam 24: How Businesses Use Databases16 Questions
Exam 14: Extension: the Impact of Artificial Intelligence15 Questions
Exam 15: Exploring Storage Devices and Ports19 Questions
Exam 16: Evaluating Websites16 Questions
Exam 17: Buying and Installing Software16 Questions
Exam 18: Organizing Your Computer: File Management17 Questions
Exam 19: Evaluating Computer System Components16 Questions
Exam 20: Managing and Securing Your Wireless Network15 Questions
Exam 21: Understanding Intellectual Property and Copyright15 Questions
Exam 22: Understanding Firewalls16 Questions
Exam 23: a Variety of Programming Languages14 Questions
Exam 25: Transmission Media and Network Adapters15 Questions
Exam 26: Keeping E-Mail Secure16 Questions
Select questions type
Which of the following is a program that appears to be something useful or desirable but does something malicious in the background?
Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
B
Anyone who unlawfully breaks into an individual computer or a computer network is called a(n) ________.
Free
(Short Answer)
4.7/5
(41)
Correct Answer:
hacker
Hackers can use packet ________ to capture valuable information, then sell or use the information illegally.
Free
(Multiple Choice)
4.9/5
(30)
Correct Answer:
C
________ floods a computer with requests until it shuts down denying access to legitimate users.
(Multiple Choice)
4.7/5
(29)
A good way to keep hackers out of a computer is to install a(n) ________.
(Short Answer)
4.8/5
(36)
A firewall designed specifically for home networks is called a ________ firewall.
(Multiple Choice)
4.8/5
(30)
Using a ________, you can screen data coming into the logical ports to see if it comes from a trusted source.
(Multiple Choice)
4.9/5
(31)
ShieldsUP and LeakTest are software programs you can use to test whether ________.
(Multiple Choice)
4.8/5
(21)
Attacks that are launched from multiple zombie computers at the same time are called ________.
(Multiple Choice)
4.8/5
(34)
Match each of the following terms to its meaning:
I. firewall
II. hacker
III. packet
IV. botnet
V. virus
A. prevents intrusion into your computer
B. a small program that can compromise a computer system
C. small piece of data that travels through the Internet
D. a person who poses a threat to your computer
E. group of software programs that usually run independently on a large number of zombie computers
(Short Answer)
4.8/5
(30)
A large group of software programs that runs autonomously on zombie computers is called a(n) ________.
(Short Answer)
4.9/5
(29)
Virtual communications gateways that allow a computer to accept requests for information from other networks or computers are called ________.
(Multiple Choice)
5.0/5
(34)
Match each of the following terms to its definition:
I. packet filtering
II. zombie
III. firewall
IV. network address translation
V. packet sniffer
A. technique of assigning hidden internal IP addresses to protect a network against hackers
B. method for selectively allowing certain requests to access a port
C. hardware or software for protecting computers from hackers
D. a computer controlled by a hacker
E. program used by hackers to look at individual packets as they travel on the Internet
(Short Answer)
4.8/5
(34)
A program installed by hackers that allows them to take almost complete control of your computer without your knowledge is called a(n) ________ program.
(Short Answer)
4.9/5
(35)
________ is characterized by someone using personal information about you (such as your name or Social Security number) for the purpose of defrauding others.
(Short Answer)
4.7/5
(35)
A game or screen saver that appears desirable or useful but when it runs does something malicious is called a(n) ________.
(Short Answer)
4.8/5
(41)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)