Exam 9: Securing Your System: Protecting Your Digital Data and Devices
Exam 1: The Impact of Technology in a Changing World75 Questions
Exam 2: Looking at Computers: Understanding the Parts74 Questions
Exam 3: Using the Internet: Making the Most of the Webs Resources77 Questions
Exam 4: Application Software: Programs That Let You Work and Play75 Questions
Exam 5: System Software: the Operating System, Utility Programs, and File Management72 Questions
Exam 6: Understanding and Assessing Hardware: Evaluating Your System77 Questions
Exam 7: Networking: Connecting Computing Devices73 Questions
Exam 8: Managing a Digital Lifestyle: Media and Ethics75 Questions
Exam 9: Securing Your System: Protecting Your Digital Data and Devices76 Questions
Exam 10: Behind the Scenes: Software Programming75 Questions
Exam 11: Behind the Scenes: Databases and Information Systems75 Questions
Exam 12: Behind the Scenes: Networking and Security in the Business World76 Questions
Exam 13: Behind the Scenes: How the Internet Works74 Questions
Exam 14: the History of the Personal Computer34 Questions
Exam 15: Careers in It33 Questions
Select questions type
A botnet is a group of applications running on ________ computers in a DDoS attack.
(Short Answer)
4.8/5
(34)
________ occur when a website downloads harmful software onto your computer.
(Short Answer)
4.7/5
(38)
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?
(Multiple Choice)
4.8/5
(41)
________ floods a computer with requests until it shuts down and refuses to answer any requests for information.
(Multiple Choice)
4.9/5
(33)
In computing, a ________ is named after a housing construction feature that slows the spread of fires from house to house.
(Multiple Choice)
4.9/5
(35)
Which is not one of the four key pieces of personal information you should protect from identity thieves?
(Multiple Choice)
4.9/5
(33)
One way to protect your personal information on Facebook is to change your ________ settings.
(Short Answer)
4.9/5
(31)
Rules for creating passwords include all of the following EXCEPT ________.
(Multiple Choice)
4.9/5
(34)
A(n) ________ backup backs up only the files on a computer that have changed since the last time a backup was performed.
(Short Answer)
4.9/5
(37)
You should use the same password for each system or website you need to access.
(True/False)
4.8/5
(36)
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.
(Multiple Choice)
4.9/5
(34)
You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ________.
(Multiple Choice)
4.7/5
(31)
Devices that use a unique personal characteristic, such as a fingerprint, in place of a password are called ________ authentication devices.
(Short Answer)
4.8/5
(30)
________ is the act of tricking people into revealing sensitive information and is often associated with credit card fraud.
(Short Answer)
4.9/5
(40)
Showing 21 - 40 of 76
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)