Exam 5: Data Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

One advantage of using a network server for backup is that you do not need to be connected to the network server in order to backup or retrieve your files.

(True/False)
4.9/5
(38)

____ is an email or IM-based scam designed to persuade you to reveal confidential information.

(Multiple Choice)
4.9/5
(40)

During startup, if your computer's screen remains blank or an error message appears, you may have a ____.

(Multiple Choice)
4.8/5
(38)

Jordanna recently lost a lot of data when a virus attacked her computer system. She is coming up with a backup plan to minimize future data loss. Jordanna knows that a ____ is a bootable disk that contains a complete copy of your computer's hard drive as it existed when shipped from the manufacturer.

(Multiple Choice)
4.9/5
(32)

Black hats and crackers are ____.

(Multiple Choice)
4.9/5
(35)

If a pop-up ad for a security suite opens on your computer, you should click on it to install the software.

(True/False)
4.7/5
(40)

A ____ attack is when hackers intercept information sent out over networks.

(Multiple Choice)
4.9/5
(38)

If you encounter the blue screen of death, ____.

(Multiple Choice)
4.7/5
(28)

____ viruses infect the system files your computer uses every time it powers up.

(Multiple Choice)
4.9/5
(34)

A ____ is the basis for encrypting and decrypting the data transmitted between wireless devices.

(Multiple Choice)
4.9/5
(33)

One of the biggest security threats to your computer is the result of malicious code, called ____________________.

(Short Answer)
4.8/5
(28)
Showing 61 - 71 of 71
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)