Exam 9: Securing Your System: Protecting Your Digital Data and Devices

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

For security reasons, you should be extremely wary of opening e-mail ________ such as Word files.

Free
(Short Answer)
4.8/5
(41)
Correct Answer:
Verified

attachments

Virtual private networks (VPNs) are secure networks that are established without using the public Internet infrastructure.

Free
(True/False)
4.9/5
(33)
Correct Answer:
Verified

False

________ hackers break into systems legally for non-malicious reasons such as to test system security vulnerabilities.

Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
Verified

C

Match each of the following terms to its meaning:
polymorphic virus
attempts to travel between systems through network connections to spread an infection
logic bomb
virus that is triggered when a file is opened or program is started a certain number of times
computer virus
virus that changes its own code to avoid detection
Correct Answer:
Verified
Premises:
Responses:
polymorphic virus
attempts to travel between systems through network connections to spread an infection
logic bomb
virus that is triggered when a file is opened or program is started a certain number of times
computer virus
virus that changes its own code to avoid detection
encryption virus
a program that renders your computer files unusable by compressing them
worm
program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files
(Matching)
4.9/5
(41)
Match each of the following terms to its meaning:
black-hat hacker
an ethical hacker
grey-hat hacker
an unethical hacker
white-hat hacker
techniques used to manipulate people into performing actions or divulging confidential information
Correct Answer:
Verified
Premises:
Responses:
black-hat hacker
an ethical hacker
grey-hat hacker
an unethical hacker
white-hat hacker
techniques used to manipulate people into performing actions or divulging confidential information
social engineering
using an employer's computer for non-work activities
cyberloafing
flaunts expertise to the administrator of a system
(Matching)
4.9/5
(29)

A(n) ________ protects a computer against power surges.

(Short Answer)
4.9/5
(31)

Which type of virus was the famous Michelangelo virus?

(Multiple Choice)
5.0/5
(41)

When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________.

(Multiple Choice)
4.9/5
(43)

Unwanted, unsolicited e-mail is referred to as ________.

(Short Answer)
4.8/5
(44)

Which of the following statements about cookies is NOT true?

(Multiple Choice)
4.8/5
(27)

A(n) ________ can help block unwanted, unsolicited e-mail.

(Short Answer)
4.7/5
(44)

Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.

(Short Answer)
4.8/5
(35)

The most common kind of pretexting in cyberspace is ________.

(Short Answer)
4.8/5
(42)

An encryption virus replicates itself onto a hard drive's master boot record.

(True/False)
5.0/5
(18)

A worm does NOT require human interaction to spread to other computers.

(True/False)
4.8/5
(34)

A(n) ________ virus temporarily erases its code from the files where it resides, and then hides in the active memory of the computer.

(Short Answer)
4.9/5
(38)

All of the following activities may infect your computer with a virus EXCEPT ________.

(Multiple Choice)
5.0/5
(36)

________ alarm software is an inexpensive theft deterrent for mobile devices.

(Short Answer)
4.8/5
(41)

Viruses, adware, and spyware are referred to collectively as ________.

(Multiple Choice)
4.8/5
(30)

Victims of ________ can spend months, or even years, trying to repair their credit and eliminate fraudulent debts.

(Short Answer)
4.9/5
(42)
Showing 1 - 20 of 76
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)