Exam 5: Data Security
Exam 1: Computer and Internet Basics71 Questions
Exam 2: Computer Hardware71 Questions
Exam 3: Computer Software71 Questions
Exam 4: File Management and Digital Electronics71 Questions
Exam 5: Data Security71 Questions
Exam 6: Networks and Connecting to the Internet71 Questions
Exam 7: The Web and E-Commerce71 Questions
Exam 8: Digital Media71 Questions
Exam 9: Technology, Careers, and Job Hunting71 Questions
Select questions type
An email with a dire warning about a new virus is usually a virus ____________________.
Free
(Short Answer)
4.7/5
(43)
Correct Answer:
hoax
Software failure can be caused by a(n) worm , which is a flaw in the program code or design.
Free
(True/False)
4.8/5
(39)
Correct Answer:
False
A virus ____ is a section of program code that can be used to identify a known malicious program.
(Multiple Choice)
4.8/5
(38)
Port scanning software can examine more than ____ computers per minute.
(Multiple Choice)
4.8/5
(31)
____ viruses infect the system files your computer uses every time it powers up.
(Multiple Choice)
4.9/5
(30)
A ____ is a program that seems to perform one function while actually doing something else.
(Multiple Choice)
4.8/5
(31)
A(n) ____ contains your computer settings and is used if you experience a hard drive problem.
(Multiple Choice)
4.7/5
(29)
A(n) ____ is software or hardware designed to filter out suspicious data attempting to enter or leave a computer.
(Multiple Choice)
4.8/5
(42)
A(n) differential backup makes a backup of the files that were added or changed since the last backup.
(True/False)
4.9/5
(26)
____________________ management is the process of identifying potential threats, avoiding as many threats as possible, and developing steps to fix whatever went wrong.
(Short Answer)
4.9/5
(30)
What is malware? List and describe four things that malware can do to your computer.
(Essay)
4.9/5
(30)
All of the following are good tips for creating secure passwords EXCEPT ____.
(Multiple Choice)
4.8/5
(28)
A security suite might include detecting intrusions into your wireless network.
(True/False)
4.8/5
(37)
____ is the practice of intercepting signals with a Wi-Fi enabled notebook.
(Multiple Choice)
4.9/5
(37)
Kyle is training a new employee named Mira on how to set up measures to protect the computers and systems in their company. Kyle tells his co-worker Mira that ____ is the most secure password for her to choose.
(Multiple Choice)
4.7/5
(42)
Provide 10 tips for keeping your computer system in good working condition.
(Essay)
4.8/5
(29)
Viruses that deliver their payloads in response to a system event are referred to as ____ bombs.
(Multiple Choice)
4.9/5
(29)
Internet service providers use e-mail ____ techniques to verify that e-mail messages originate from the Internet domain from which they claim to have been sent.
(Multiple Choice)
4.7/5
(35)
A good ____ can be used to scan the Web to assemble data for search engines.
(Multiple Choice)
4.8/5
(41)
Showing 1 - 20 of 71
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)