Exam 5: Data Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

STOP is ____.

Free
(Multiple Choice)
4.7/5
(34)
Correct Answer:
Verified

A

An email with a dire warning about a new virus is usually a virus ____________________.

Free
(Short Answer)
4.7/5
(43)
Correct Answer:
Verified

hoax

Software failure can be caused by a(n) worm , which is a flaw in the program code or design.

Free
(True/False)
4.8/5
(39)
Correct Answer:
Verified

False

A virus ____ is a section of program code that can be used to identify a known malicious program.

(Multiple Choice)
4.8/5
(38)

Port scanning software can examine more than ____ computers per minute.

(Multiple Choice)
4.8/5
(31)

____ viruses infect the system files your computer uses every time it powers up.

(Multiple Choice)
4.9/5
(30)

A ____ is a program that seems to perform one function while actually doing something else.

(Multiple Choice)
4.8/5
(31)

A(n) ____ contains your computer settings and is used if you experience a hard drive problem.

(Multiple Choice)
4.7/5
(29)

A(n) ____ is software or hardware designed to filter out suspicious data attempting to enter or leave a computer.

(Multiple Choice)
4.8/5
(42)

A(n) differential backup makes a backup of the files that were added or changed since the last backup.

(True/False)
4.9/5
(26)

____________________ management is the process of identifying potential threats, avoiding as many threats as possible, and developing steps to fix whatever went wrong.

(Short Answer)
4.9/5
(30)

What is malware? List and describe four things that malware can do to your computer.

(Essay)
4.9/5
(30)

All of the following are good tips for creating secure passwords EXCEPT ____.

(Multiple Choice)
4.8/5
(28)

A security suite might include detecting intrusions into your wireless network.

(True/False)
4.8/5
(37)

____ is the practice of intercepting signals with a Wi-Fi enabled notebook.

(Multiple Choice)
4.9/5
(37)

Kyle is training a new employee named Mira on how to set up measures to protect the computers and systems in their company. Kyle tells his co-worker Mira that ____ is the most secure password for her to choose.

(Multiple Choice)
4.7/5
(42)

Provide 10 tips for keeping your computer system in good working condition.

(Essay)
4.8/5
(29)

Viruses that deliver their payloads in response to a system event are referred to as ____ bombs.

(Multiple Choice)
4.9/5
(29)

Internet service providers use e-mail ____ techniques to verify that e-mail messages originate from the Internet domain from which they claim to have been sent.

(Multiple Choice)
4.7/5
(35)

A good  ____ can be used to scan the Web to assemble data for search engines.

(Multiple Choice)
4.8/5
(41)
Showing 1 - 20 of 71
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)