Exam 9: Securing Your System: Protecting Your Digital Data and Devices

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A botnet is a group of applications running on ________ computers in a DDoS attack.

(Short Answer)
4.8/5
(34)

________ occur when a website downloads harmful software onto your computer.

(Short Answer)
4.7/5
(38)

Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?

(Multiple Choice)
4.8/5
(41)

Government impersonation scams involve ________.

(Multiple Choice)
4.8/5
(34)

________ floods a computer with requests until it shuts down and refuses to answer any requests for information.

(Multiple Choice)
4.9/5
(33)

In computing, a ________ is named after a housing construction feature that slows the spread of fires from house to house.

(Multiple Choice)
4.9/5
(35)

Which is not one of the four key pieces of personal information you should protect from identity thieves?

(Multiple Choice)
4.9/5
(33)

Currently, there are no antivirus programs for mobile devices.

(True/False)
4.8/5
(39)

One way to protect your personal information on Facebook is to change your ________ settings.

(Short Answer)
4.9/5
(31)

A ________ is a virus that is triggered on a certain date.

(Multiple Choice)
4.8/5
(39)

The terms virus and worm mean the same thing.

(True/False)
4.7/5
(31)

Which of the following is NOT a virus category?

(Multiple Choice)
4.7/5
(34)

Rules for creating passwords include all of the following EXCEPT ________.

(Multiple Choice)
4.9/5
(34)

A(n) ________ backup backs up only the files on a computer that have changed since the last time a backup was performed.

(Short Answer)
4.9/5
(37)

You should use the same password for each system or website you need to access.

(True/False)
4.8/5
(36)

Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.

(Multiple Choice)
4.9/5
(34)

A ________ is a virus that is attached to documents.

(Multiple Choice)
4.8/5
(35)

You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ________.

(Multiple Choice)
4.7/5
(31)

Devices that use a unique personal characteristic, such as a fingerprint, in place of a password are called ________ authentication devices.

(Short Answer)
4.8/5
(30)

________ is the act of tricking people into revealing sensitive information and is often associated with credit card fraud.

(Short Answer)
4.9/5
(40)
Showing 21 - 40 of 76
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)