Exam 9: Securing Your System: Protecting Your Digital Data and Devices
Exam 1: The Impact of Technology in a Changing World120 Questions
Exam 2: Looking at Computers: Understanding the Parts140 Questions
Exam 3: Using the Internet: Making the Most of the Webs Resources129 Questions
Exam 4: Application Software: Programs That Let You Work and Play124 Questions
Exam 5: System Software: the Operating System, Utility Programs, and File Management133 Questions
Exam 6: Understanding and Assessing Hardware: Evaluating Your System134 Questions
Exam 7: Networking: Connecting Computing Devices132 Questions
Exam 8: Managing a Digital Lifestyle: Challenges and Ethics128 Questions
Exam 9: Securing Your System: Protecting Your Digital Data and Devices135 Questions
Exam 10: Behind the Scenes: Software Programming130 Questions
Exam 11: Behind the Scenes: Databases and Information Systems134 Questions
Exam 12: Behind the Scenes: Networking and Security in the Business World127 Questions
Exam 13: Behind the Scenes: How the Internet Works124 Questions
Exam 14: Technology In Action Complete: Appendix A41 Questions
Exam 15: Technology In Action Complete: Appendix B36 Questions
Select questions type
Someone who maliciously invades a computer system to steal or destroy information. is known as a(n) ________.
Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
B
Match each of the following terms to its definition:
Correct Answer:
Premises:
Responses:
Free
(Matching)
4.8/5
(42)
Correct Answer:
________ occur when a website downloads harmful software onto your computer.
Free
(Short Answer)
4.9/5
(34)
Correct Answer:
Drive-by downloads, drive by downloads
Virtual communications gateways that allow a computer to accept requests for information from other networks or computers are called ________.
(Multiple Choice)
4.9/5
(35)
A firewall designed specifically for home networks is called a ________ firewall.
(Multiple Choice)
4.9/5
(35)
Which of the following statements about cookies is not true?
(Multiple Choice)
4.8/5
(34)
________ is characterized by someone using personal information about you (such as your name or Social Security number) for the purpose of defrauding others.
(Short Answer)
4.7/5
(36)
The most common occurrence of identity compromise is through ________.
(Multiple Choice)
4.8/5
(36)
When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________.
(Multiple Choice)
4.8/5
(36)
Personal firewalls can close open logical ports and make your computer invisible to other computers on the Internet.
(True/False)
4.9/5
(30)
Match each of the following terms to its definition:
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(31)
Which of the following is a program that appears to be something useful or desirable but does something malicious in the background?
(Multiple Choice)
4.8/5
(41)
One way to protect your personal information on Facebook is to change your ________ settings.
(Short Answer)
4.8/5
(41)
________ floods a computer with requests until it shuts down denying access to legitimate users.
(Multiple Choice)
4.8/5
(42)
________ is a program that gathers information about your surfing habits without your knowledge.
(Multiple Choice)
4.8/5
(32)
A(n) ________ takes advantage of file transport methods, such as e-mail, to spread on its own.
(Multiple Choice)
4.9/5
(29)
Computer ________ involves identifying, extracting, preserving, and documenting computer evidence.
(Multiple Choice)
4.7/5
(37)
Showing 1 - 20 of 135
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)