Exam 9: Securing Your System: Protecting Your Digital Data and Devices

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Devices that use a unique personal characteristic, such as a fingerprint, in place of a password are called ________ authentication devices.

(Short Answer)
4.8/5
(27)

________ kits are software programs that run on servers and search for vulnerabilities of computers that visit the server.

(Short Answer)
4.8/5
(36)

A(n) ________ is a program that analyzes the contents of data packets on a network.

(Multiple Choice)
4.8/5
(37)

Using a backdoor program, you can use your computer while you are away from the office.

(True/False)
4.9/5
(32)

Which of the following viruses is designed to infect multiple file types in an effort to fool the antivirus software that is looking for it?

(Multiple Choice)
4.9/5
(32)

A worm does not require human interaction to spread to other computers.

(True/False)
4.8/5
(25)

A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.

(Multiple Choice)
4.8/5
(36)

An image backup is the same as a system backup.

(True/False)
4.8/5
(41)

A ________ is a virus that is attached to documents.

(Multiple Choice)
4.9/5
(23)

Which of the following is formally defined as any criminal action perpetrated primarily using a computer?

(Multiple Choice)
4.8/5
(35)
Match each of the following terms to its meaning:
social engineering
an ethical hacker
gray-hat hacker
an unethical hacker
white-hat hacker
techniques used to manipulate people into performing actions or divulging confidential information
Correct Answer:
Verified
Premises:
Responses:
social engineering
an ethical hacker
gray-hat hacker
an unethical hacker
white-hat hacker
techniques used to manipulate people into performing actions or divulging confidential information
cyberloafing
using an employer's computer for non-work activities
black-hat hacker
flaunts expertise to the administrator of a system
(Matching)
4.9/5
(31)

Anyone who breaks into a computer system is known as a(n) ________.

(Short Answer)
4.8/5
(37)
Match each of the following terms to its meaning:
encryption virus
program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files
polymorphic virus
virus that is triggered when certain conditions are met
worm
virus that changes its own code to avoid detection
Correct Answer:
Verified
Premises:
Responses:
encryption virus
program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files
polymorphic virus
virus that is triggered when certain conditions are met
worm
virus that changes its own code to avoid detection
computer virus
attempts to travel between systems through network connections to spread an infection
logic bomb
a program that renders your computer files unusable by compressing them
(Matching)
4.7/5
(34)

All of the following pieces of information should be highly guarded while using a public Wi-Fi hotspot, EXCEPT ________.

(Multiple Choice)
4.8/5
(34)

All of the following activities may infect your computer with a virus except ________.

(Multiple Choice)
4.7/5
(38)
Showing 121 - 135 of 135
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)