Exam 5: Data Security
Exam 1: Computer and Internet Basics71 Questions
Exam 2: Computer Hardware71 Questions
Exam 3: Computer Software71 Questions
Exam 4: File Management and Digital Electronics71 Questions
Exam 5: Data Security71 Questions
Exam 6: Networks and Connecting to the Internet71 Questions
Exam 7: The Web and E-Commerce70 Questions
Exam 8: Digital Media71 Questions
Exam 9: Technology, Careers, and Job Hunting71 Questions
Select questions type
One advantage of using a network server for backup is that you do not need to be connected to the network server in order to backup or retrieve your files.
(True/False)
4.9/5
(38)
____ is an email or IM-based scam designed to persuade you to reveal confidential information.
(Multiple Choice)
4.9/5
(40)
During startup, if your computer's screen remains blank or an error message appears, you may have a ____.
(Multiple Choice)
4.8/5
(38)
Jordanna recently lost a lot of data when a virus attacked her computer system. She is coming up with a backup plan to minimize future data loss. Jordanna knows that a ____ is a bootable disk that contains a complete copy of your computer's hard drive as it existed when shipped from the manufacturer.
(Multiple Choice)
4.9/5
(32)
If a pop-up ad for a security suite opens on your computer, you should click on it to install the software.
(True/False)
4.7/5
(40)
A ____ attack is when hackers intercept information sent out over networks.
(Multiple Choice)
4.9/5
(38)
____ viruses infect the system files your computer uses every time it powers up.
(Multiple Choice)
4.9/5
(34)
A ____ is the basis for encrypting and decrypting the data transmitted between wireless devices.
(Multiple Choice)
4.9/5
(33)
One of the biggest security threats to your computer is the result of malicious code, called ____________________.
(Short Answer)
4.8/5
(28)
Showing 61 - 71 of 71
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)