Exam 9: Securing Your System: Protecting Your Digital Data and Devices

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following virus types changes its own code to avoid detection?

(Multiple Choice)
4.8/5
(28)

A(n) ____virus replicates itself onto a hard drive's master boot record.

(Multiple Choice)
4.9/5
(42)

Which type of hackers break into systems for the thrill or to show off their skills.

(Multiple Choice)
4.8/5
(33)

The most common kind of pretexting in cyberspace is ________.

(Short Answer)
4.8/5
(31)

Computer ________ involves identifying, extracting, preserving, and documenting computer evidence.

(Short Answer)
4.9/5
(35)

________ tries to convince you that your computer is infected.

(Short Answer)
4.8/5
(31)

________ is the act of tricking people into revealing sensitive information and is often associated with credit card fraud.

(Short Answer)
4.8/5
(41)

You should use the same password for each system or website you need to access.

(True/False)
4.8/5
(31)

Currently, there are no antivirus programs for mobile devices.

(True/False)
4.8/5
(36)

________ floods a computer with requests until it shuts down and refuses to answer any requests for information.

(Multiple Choice)
4.7/5
(30)

A virus signature is a portion of virus code that is unique to a particular computer virus.

(True/False)
4.8/5
(38)

A good way to keep hackers out of a computer is to install a(n) ________.

(Short Answer)
4.9/5
(32)

A denial-of-service attack can be used to deny hackers access to a computer system.

(True/False)
4.9/5
(37)

Computer forensics is used to collect evidence for use in courtrooms.

(True/False)
5.0/5
(28)

Data breaches are always intentional.

(True/False)
4.9/5
(33)

Which type of backup ensures you capture a complete snapshot of everything that makes your computer run?

(Multiple Choice)
4.8/5
(40)

________ alarm software is an inexpensive theft deterrent for mobile devices.

(Short Answer)
4.8/5
(32)

Virtual private networks (VPNs) are secure networks that are established without using the public Internet infrastructure.

(True/False)
4.7/5
(40)

All of the following are top cybercrimes reported to the IC3 except ________.

(Multiple Choice)
4.9/5
(43)

Which is not one of the four key pieces of personal information you should protect from identity thieves?

(Multiple Choice)
4.8/5
(32)
Showing 21 - 40 of 135
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)