Exam 9: Securing Your System: Protecting Your Digital Data and Devices
Exam 1: The Impact of Technology in a Changing World75 Questions
Exam 2: Looking at Computers: Understanding the Parts74 Questions
Exam 3: Using the Internet: Making the Most of the Webs Resources77 Questions
Exam 4: Application Software: Programs That Let You Work and Play75 Questions
Exam 5: System Software: the Operating System, Utility Programs, and File Management72 Questions
Exam 6: Understanding and Assessing Hardware: Evaluating Your System77 Questions
Exam 7: Networking: Connecting Computing Devices73 Questions
Exam 8: Managing a Digital Lifestyle: Media and Ethics75 Questions
Exam 9: Securing Your System: Protecting Your Digital Data and Devices76 Questions
Exam 10: Behind the Scenes: Software Programming75 Questions
Exam 11: Behind the Scenes: Databases and Information Systems75 Questions
Exam 12: Behind the Scenes: Networking and Security in the Business World76 Questions
Exam 13: Behind the Scenes: How the Internet Works74 Questions
Exam 14: the History of the Personal Computer34 Questions
Exam 15: Careers in It33 Questions
Select questions type
For security reasons, you should be extremely wary of opening e-mail ________ such as Word files.
Free
(Short Answer)
4.8/5
(41)
Correct Answer:
attachments
Virtual private networks (VPNs) are secure networks that are established without using the public Internet infrastructure.
Free
(True/False)
4.9/5
(33)
Correct Answer:
False
________ hackers break into systems legally for non-malicious reasons such as to test system security vulnerabilities.
Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
C
Match each of the following terms to its meaning:
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(41)
Match each of the following terms to its meaning:
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(29)
When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________.
(Multiple Choice)
4.9/5
(43)
Which of the following statements about cookies is NOT true?
(Multiple Choice)
4.8/5
(27)
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
(Short Answer)
4.8/5
(35)
An encryption virus replicates itself onto a hard drive's master boot record.
(True/False)
5.0/5
(18)
A worm does NOT require human interaction to spread to other computers.
(True/False)
4.8/5
(34)
A(n) ________ virus temporarily erases its code from the files where it resides, and then hides in the active memory of the computer.
(Short Answer)
4.9/5
(38)
All of the following activities may infect your computer with a virus EXCEPT ________.
(Multiple Choice)
5.0/5
(36)
________ alarm software is an inexpensive theft deterrent for mobile devices.
(Short Answer)
4.8/5
(41)
Viruses, adware, and spyware are referred to collectively as ________.
(Multiple Choice)
4.8/5
(30)
Victims of ________ can spend months, or even years, trying to repair their credit and eliminate fraudulent debts.
(Short Answer)
4.9/5
(42)
Showing 1 - 20 of 76
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)