Exam 9: Securing Your System: Protecting Your Digital Data and Devices

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A time bomb virus can be triggered on a certain date.

(True/False)
4.9/5
(32)

A(n) ________-hat hacker illegally penetrates a system simply to demonstrate the hacker's expertise to the system administrator.

(Short Answer)
4.9/5
(38)

Another name for a sniffer is a(n) ________ analyzer.

(Short Answer)
4.9/5
(30)

A whole-house surge protector is installed ________.

(Multiple Choice)
4.9/5
(41)

A(n) ________ virus is a series of commands that is executed without your knowledge.

(Short Answer)
4.8/5
(28)

To create a secure password, you should use a mixture of uppercase letters, lowercase letters, numbers, and symbols.

(True/False)
4.9/5
(40)

A(n) ________ backup makes a copy of all changes since the last backup.

(Multiple Choice)
4.8/5
(40)

A denial-of-service attack can be used to deny hackers access to a computer system.

(True/False)
4.7/5
(24)

One type of CAPTCHA is ________.

(Multiple Choice)
4.9/5
(39)

A(n) ________ virus is designed to infect multiple file types in an effort to fool antivirus software.

(Short Answer)
4.7/5
(28)

________ is malware that tries to convince you that your computer is infected with a virus.

(Short Answer)
4.8/5
(33)

Which of the following classifications of viruses can change its own code to avoid detection?

(Multiple Choice)
4.8/5
(39)

During the process of ________, antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive.

(Short Answer)
4.7/5
(34)

Creating and distributing ________ is one of the most widespread types of cybercrimes.

(Multiple Choice)
4.8/5
(43)
Match each of the following terms to its meaning:
cookie
programs that run on a large number of zombie computers
time bomb
program that appears to be something useful or desirable
pretexting
virus that is triggered by the passage of time or on a certain date
Correct Answer:
Verified
Premises:
Responses:
cookie
programs that run on a large number of zombie computers
time bomb
program that appears to be something useful or desirable
pretexting
virus that is triggered by the passage of time or on a certain date
botnet
text file for storing personal preferences pertaining to websites
Trojan horse
creating a scenario that sounds legitimate enough that someone will trust you
(Matching)
4.8/5
(28)

Regarding computer protection, quarantining is defined as ________.

(Multiple Choice)
4.9/5
(36)
Showing 61 - 76 of 76
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)