Exam 9: Securing Your System: Protecting Your Digital Data and Devices
Exam 1: The Impact of Technology in a Changing World120 Questions
Exam 2: Looking at Computers: Understanding the Parts140 Questions
Exam 3: Using the Internet: Making the Most of the Webs Resources129 Questions
Exam 4: Application Software: Programs That Let You Work and Play124 Questions
Exam 5: System Software: the Operating System, Utility Programs, and File Management133 Questions
Exam 6: Understanding and Assessing Hardware: Evaluating Your System134 Questions
Exam 7: Networking: Connecting Computing Devices132 Questions
Exam 8: Managing a Digital Lifestyle: Challenges and Ethics128 Questions
Exam 9: Securing Your System: Protecting Your Digital Data and Devices135 Questions
Exam 10: Behind the Scenes: Software Programming130 Questions
Exam 11: Behind the Scenes: Databases and Information Systems134 Questions
Exam 12: Behind the Scenes: Networking and Security in the Business World127 Questions
Exam 13: Behind the Scenes: How the Internet Works124 Questions
Exam 14: Technology In Action Complete: Appendix A41 Questions
Exam 15: Technology In Action Complete: Appendix B36 Questions
Select questions type
Which of the following virus types changes its own code to avoid detection?
(Multiple Choice)
4.8/5
(28)
A(n) ____virus replicates itself onto a hard drive's master boot record.
(Multiple Choice)
4.9/5
(42)
Which type of hackers break into systems for the thrill or to show off their skills.
(Multiple Choice)
4.8/5
(33)
Computer ________ involves identifying, extracting, preserving, and documenting computer evidence.
(Short Answer)
4.9/5
(35)
________ tries to convince you that your computer is infected.
(Short Answer)
4.8/5
(31)
________ is the act of tricking people into revealing sensitive information and is often associated with credit card fraud.
(Short Answer)
4.8/5
(41)
You should use the same password for each system or website you need to access.
(True/False)
4.8/5
(31)
________ floods a computer with requests until it shuts down and refuses to answer any requests for information.
(Multiple Choice)
4.7/5
(30)
A virus signature is a portion of virus code that is unique to a particular computer virus.
(True/False)
4.8/5
(38)
A good way to keep hackers out of a computer is to install a(n) ________.
(Short Answer)
4.9/5
(32)
A denial-of-service attack can be used to deny hackers access to a computer system.
(True/False)
4.9/5
(37)
Computer forensics is used to collect evidence for use in courtrooms.
(True/False)
5.0/5
(28)
Which type of backup ensures you capture a complete snapshot of everything that makes your computer run?
(Multiple Choice)
4.8/5
(40)
________ alarm software is an inexpensive theft deterrent for mobile devices.
(Short Answer)
4.8/5
(32)
Virtual private networks (VPNs) are secure networks that are established without using the public Internet infrastructure.
(True/False)
4.7/5
(40)
All of the following are top cybercrimes reported to the IC3 except ________.
(Multiple Choice)
4.9/5
(43)
Which is not one of the four key pieces of personal information you should protect from identity thieves?
(Multiple Choice)
4.8/5
(32)
Showing 21 - 40 of 135
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)