Exam 9: Threats to Your Digital Life
Exam 1: Technology Impacts16 Questions
Exam 2: Understanding Bits and Bytes21 Questions
Exam 3: Doing Business Online16 Questions
Exam 4: Choosing Software18 Questions
Exam 5: Starting the Computer: the Boot Process16 Questions
Exam 6: Evaluating Your Cpu and Ram19 Questions
Exam 7: Understanding Networking17 Questions
Exam 8: Managing Digital Media13 Questions
Exam 9: Threats to Your Digital Life20 Questions
Exam 10: Understanding Software Programming17 Questions
Exam 11: Using Databases18 Questions
Exam 12: Using Servers15 Questions
Exam 13: Understanding Ip Addresses, Domain Names, and Protocols17 Questions
Exam 24: How Businesses Use Databases16 Questions
Exam 14: Extension: the Impact of Artificial Intelligence15 Questions
Exam 15: Exploring Storage Devices and Ports19 Questions
Exam 16: Evaluating Websites16 Questions
Exam 17: Buying and Installing Software16 Questions
Exam 18: Organizing Your Computer: File Management17 Questions
Exam 19: Evaluating Computer System Components16 Questions
Exam 20: Managing and Securing Your Wireless Network15 Questions
Exam 21: Understanding Intellectual Property and Copyright15 Questions
Exam 22: Understanding Firewalls16 Questions
Exam 23: a Variety of Programming Languages14 Questions
Exam 25: Transmission Media and Network Adapters15 Questions
Exam 26: Keeping E-Mail Secure16 Questions
Select questions type
________ are often used to perform legitimate functions on websites, such as collecting names and addresses of customers, but some can be malicious and can infect your computer with a virus.
Free
(Short Answer)
4.7/5
(22)
Correct Answer:
Scripts
A(n) ________ is a program that analyzes the contents of data packets on a network.
Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
A
________ is software that has a malicious intent.
Free
(Short Answer)
4.7/5
(39)
Correct Answer:
Malware
Someone who maliciously invades a computer system to steal or destroy information. is known as a(n) ________.
(Multiple Choice)
4.9/5
(38)
Which of the following statements is NOT true about identity theft?
(Multiple Choice)
4.8/5
(39)
________ occurs when malicious code is planted on your computer, either by viruses or by your visiting malicious websites, which then alters your browser's ability to find web addresses.
(Short Answer)
4.7/5
(32)
A(n) ________ is a program that appears to be useful or desirable but does something malicious in the background without your knowledge.
(Short Answer)
4.9/5
(29)
Someone who hacks into a computer system to find and fix security vulnerabilities is known as a(n) ________.
(Multiple Choice)
4.8/5
(34)
Taking someone's personal information and posing as that person for financial or legal transactions is known as ________.
(Multiple Choice)
4.9/5
(33)
Which of the following virus types changes its own code to avoid detection?
(Multiple Choice)
4.7/5
(41)
These are all important protective measures for preventing viruses EXCEPT ________.
(Multiple Choice)
4.8/5
(32)
________ tries to convince you that your computer is infected.
(Short Answer)
4.8/5
(47)
Which of the following are considered slightly different from viruses because they can run without user interaction?
(Multiple Choice)
4.8/5
(40)
Anyone who breaks into a computer system is known as a(n) ________.
(Short Answer)
4.7/5
(36)
The most common occurrence of identity compromise is through ________.
(Multiple Choice)
4.8/5
(29)
All of the following pieces of information should be highly guarded while using a public Wi-Fi hotspot, EXCEPT ________.
(Multiple Choice)
4.9/5
(33)
A type of virus that temporarily erases itself from files and stores itself in memory to avoid detection is called a(n) ________ virus.
(Short Answer)
4.9/5
(40)
Match each of the following terms to its definition:
I. worm
II. Trojan horse
III. multipartite virus
IV. packet sniffer
V. polymorphic virus
A. a program that examines the contents of all network traffic
B. attempts to travel between systems through network connections to spread an infection
C. a virus that changes its own code to avoid detection
D. attempts to infect computers through multiple methods
E. appears to be useful but does something malicious in the background
(Short Answer)
4.9/5
(33)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)