Exam 9: Securing Your System: Protecting Your Digital Data and Devices
Exam 1: The Impact of Technology in a Changing World75 Questions
Exam 2: Looking at Computers: Understanding the Parts74 Questions
Exam 3: Using the Internet: Making the Most of the Webs Resources77 Questions
Exam 4: Application Software: Programs That Let You Work and Play75 Questions
Exam 5: System Software: the Operating System, Utility Programs, and File Management72 Questions
Exam 6: Understanding and Assessing Hardware: Evaluating Your System77 Questions
Exam 7: Networking: Connecting Computing Devices73 Questions
Exam 8: Managing a Digital Lifestyle: Media and Ethics75 Questions
Exam 9: Securing Your System: Protecting Your Digital Data and Devices76 Questions
Exam 10: Behind the Scenes: Software Programming75 Questions
Exam 11: Behind the Scenes: Databases and Information Systems75 Questions
Exam 12: Behind the Scenes: Networking and Security in the Business World76 Questions
Exam 13: Behind the Scenes: How the Internet Works74 Questions
Exam 14: the History of the Personal Computer34 Questions
Exam 15: Careers in It33 Questions
Select questions type
A(n) ________-hat hacker illegally penetrates a system simply to demonstrate the hacker's expertise to the system administrator.
(Short Answer)
4.9/5
(38)
A(n) ________ virus is a series of commands that is executed without your knowledge.
(Short Answer)
4.8/5
(28)
To create a secure password, you should use a mixture of uppercase letters, lowercase letters, numbers, and symbols.
(True/False)
4.9/5
(40)
A(n) ________ backup makes a copy of all changes since the last backup.
(Multiple Choice)
4.8/5
(40)
A denial-of-service attack can be used to deny hackers access to a computer system.
(True/False)
4.7/5
(24)
A(n) ________ virus is designed to infect multiple file types in an effort to fool antivirus software.
(Short Answer)
4.7/5
(28)
________ is malware that tries to convince you that your computer is infected with a virus.
(Short Answer)
4.8/5
(33)
Which of the following classifications of viruses can change its own code to avoid detection?
(Multiple Choice)
4.8/5
(39)
During the process of ________, antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive.
(Short Answer)
4.7/5
(34)
Creating and distributing ________ is one of the most widespread types of cybercrimes.
(Multiple Choice)
4.8/5
(43)
Match each of the following terms to its meaning:
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(28)
Regarding computer protection, quarantining is defined as ________.
(Multiple Choice)
4.9/5
(36)
Showing 61 - 76 of 76
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)