Exam 9: Securing Your System: Protecting Your Digital Data and Devices
Exam 1: The Impact of Technology in a Changing World75 Questions
Exam 2: Looking at Computers: Understanding the Parts74 Questions
Exam 3: Using the Internet: Making the Most of the Webs Resources77 Questions
Exam 4: Application Software: Programs That Let You Work and Play75 Questions
Exam 5: System Software: the Operating System, Utility Programs, and File Management72 Questions
Exam 6: Understanding and Assessing Hardware: Evaluating Your System77 Questions
Exam 7: Networking: Connecting Computing Devices73 Questions
Exam 8: Managing a Digital Lifestyle: Media and Ethics75 Questions
Exam 9: Securing Your System: Protecting Your Digital Data and Devices76 Questions
Exam 10: Behind the Scenes: Software Programming75 Questions
Exam 11: Behind the Scenes: Databases and Information Systems75 Questions
Exam 12: Behind the Scenes: Networking and Security in the Business World76 Questions
Exam 13: Behind the Scenes: How the Internet Works74 Questions
Exam 14: the History of the Personal Computer34 Questions
Exam 15: Careers in It33 Questions
Select questions type
The Internet Crime Complaint Center (IC3) is a partnership between the ________.
(Multiple Choice)
4.8/5
(38)
A(n) ________ is the portion of virus code that is unique to a particular computer virus.
(Multiple Choice)
4.9/5
(39)
Match each of the following terms to its meaning:
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(37)
A(n) ________ virus runs a program that searches for common types of data files, compresses them, and makes them unusable.
(Short Answer)
4.7/5
(35)
A(n) ________ takes advantage of file transport methods, such as e-mail, to spread on its own.
(Multiple Choice)
4.8/5
(34)
A stealth virus is designed to infect multiple file types to fool the antivirus software.
(True/False)
4.9/5
(31)
All of the following are top cybercrimes reported to the IC3 EXCEPT ________.
(Multiple Choice)
4.8/5
(39)
Match each of the following terms to its meaning:
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(41)
Using your computer for non-work activities while you are being paid to work is known as ________.
(Multiple Choice)
4.7/5
(30)
The best defense against viruses is to install ________ software, which is specifically designed to detect viruses and protect your computer and files from harm.
(Short Answer)
4.8/5
(34)
Since you can always redownload program files, you do not need to include them in backups.
(True/False)
4.7/5
(42)
A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.
(Multiple Choice)
4.8/5
(34)
A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT ________.
(Multiple Choice)
4.9/5
(27)
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
(Multiple Choice)
4.9/5
(28)
________ is a program that gathers information about your surfing habits without your knowledge.
(Multiple Choice)
4.8/5
(26)
A virus signature is a portion of virus code that is unique to a particular computer virus.
(True/False)
4.9/5
(46)
Showing 41 - 60 of 76
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)