Exam 5: Data Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags
Identify the correct answer from the list of choices.
E-mail that leads users to a fake site and asks them to confirm personal information.
Data diddling
Unauthorized alterations to information, such as changing a student's grades.
Dictionary attack
Guessing a password using a list of common passwords.
Phishing
Correct Answer:
Verified
Premises:
Responses:
E-mail that leads users to a fake site and asks them to confirm personal information.
Data diddling
Unauthorized alterations to information, such as changing a student's grades.
Dictionary attack
Guessing a password using a list of common passwords.
Phishing
Poisons a domain name server with a false IP address.
Pharming
Displays a combination of letters and numbers that you must type.
Captcha
(Matching)
4.7/5
(37)

____ spikes can damage sensitive computer parts.

(Multiple Choice)
4.8/5
(39)

Kyle is training a new employee named Mira on how to set up measures to protect the computers and systems in their company. Kyle tells his co-worker Mira that to avoid malware, she should avoid all of the following EXCEPT ____.

(Multiple Choice)
4.8/5
(37)

Spam is email generated by marketing firms using e-mail addresses from mailing lists, membership applications, and Web sites.

(True/False)
4.8/5
(31)

____ are rules that limit access to directories and files.

(Multiple Choice)
4.8/5
(35)

Jordanna recently lost a lot of data when a virus attacked her computer system. She is coming up with a backup plan to minimize future data loss. Jordanna uses her Windows installation CD as a ____, because it contains the operating system files needed to boot her computer without accessing the hard drive.

(Multiple Choice)
4.8/5
(38)

A(n) ____ is a computer that carries out instructions without the knowledge of the computer owner.

(Multiple Choice)
4.7/5
(40)

A(n) ____________________ spreads when a person distributes an infected file.

(Short Answer)
4.9/5
(24)

  Technology like the kind shown in the accompanying figure is an example of a ____________________ identification system. Technology like the kind shown in the accompanying figure is an example of a ____________________ identification system.

(Short Answer)
4.8/5
(43)

A recovery disk contains a complete copy of your computer's hard drive, including your data files and software you installed.

(True/False)
4.9/5
(43)

In Safe Mode, you can use all of the following EXCEPT ____.

(Multiple Choice)
5.0/5
(47)

All of the following are good tips for creating secure passwords EXCEPT ____.

(Multiple Choice)
4.8/5
(44)

A virus spreads by itself from one computer to another.

(True/False)
4.8/5
(39)

What are five tips for preventing computer theft?

(Essay)
4.7/5
(45)

All of the following are other terms for user IDs EXCEPT ____.

(Multiple Choice)
4.9/5
(34)

  The item in the accompanying figure is used to protect your computer from ____. The item in the accompanying figure is used to protect your computer from ____.

(Multiple Choice)
4.9/5
(43)

Hackers can spread worms over file-sharing networks and instant messaging links.

(True/False)
4.9/5
(37)

STOP is ____.

(Multiple Choice)
4.9/5
(40)

A(n) ____________________ probe is the use of automated software to locate computers that are vulnerable to unauthorized access.

(Short Answer)
5.0/5
(39)

A(n) ____ contains your computer settings and is used if you experience a hard drive problem.

(Multiple Choice)
4.9/5
(43)
Showing 41 - 60 of 71
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)