Exam 5: Data Security
Exam 1: Computer and Internet Basics71 Questions
Exam 2: Computer Hardware71 Questions
Exam 3: Computer Software71 Questions
Exam 4: File Management and Digital Electronics71 Questions
Exam 5: Data Security71 Questions
Exam 6: Networks and Connecting to the Internet71 Questions
Exam 7: The Web and E-Commerce70 Questions
Exam 8: Digital Media71 Questions
Exam 9: Technology, Careers, and Job Hunting71 Questions
Select questions type
Identify the correct answer from the list of choices.
Correct Answer:
Premises:
Responses:
(Matching)
4.7/5
(37)
Kyle is training a new employee named Mira on how to set up measures to protect the computers and systems in their company. Kyle tells his co-worker Mira that to avoid malware, she should avoid all of the following EXCEPT ____.
(Multiple Choice)
4.8/5
(37)
Spam is email generated by marketing firms using e-mail addresses from mailing lists, membership applications, and Web sites.
(True/False)
4.8/5
(31)
Jordanna recently lost a lot of data when a virus attacked her computer system. She is coming up with a backup plan to minimize future data loss. Jordanna uses her Windows installation CD as a ____, because it contains the operating system files needed to boot her computer without accessing the hard drive.
(Multiple Choice)
4.8/5
(38)
A(n) ____ is a computer that carries out instructions without the knowledge of the computer owner.
(Multiple Choice)
4.7/5
(40)
A(n) ____________________ spreads when a person distributes an infected file.
(Short Answer)
4.9/5
(24)
Technology like the kind shown in the accompanying figure is an example of a ____________________ identification system.

(Short Answer)
4.8/5
(43)
A recovery disk contains a complete copy of your computer's hard drive, including your data files and software you installed.
(True/False)
4.9/5
(43)
In Safe Mode, you can use all of the following EXCEPT ____.
(Multiple Choice)
5.0/5
(47)
All of the following are good tips for creating secure passwords EXCEPT ____.
(Multiple Choice)
4.8/5
(44)
All of the following are other terms for user IDs EXCEPT ____.
(Multiple Choice)
4.9/5
(34)
The item in the accompanying figure is used to protect your computer from ____.

(Multiple Choice)
4.9/5
(43)
Hackers can spread worms over file-sharing networks and instant messaging links.
(True/False)
4.9/5
(37)
A(n) ____________________ probe is the use of automated software to locate computers that are vulnerable to unauthorized access.
(Short Answer)
5.0/5
(39)
A(n) ____ contains your computer settings and is used if you experience a hard drive problem.
(Multiple Choice)
4.9/5
(43)
Showing 41 - 60 of 71
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)