Exam 5: Data Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

  The application in the accompanying figure is an example of a program that protects against ____. The application in the accompanying figure is an example of a program that protects against ____.

(Multiple Choice)
4.8/5
(32)

In Safe Mode, you can use all of the following EXCEPT ____.

(Multiple Choice)
4.8/5
(38)

The information that antivirus software uses to identify and remove malware is referred to as a virus ____.

(Multiple Choice)
4.8/5
(37)

Kyle is training a new employee named Mira on how to set up measures to protect the computers and systems in their company. Kyle tells his co-worker Mira that which of the following is NOT true about cookies?

(Multiple Choice)
5.0/5
(24)

If a pop-up ad for a security suite opens on your computer, you should click on it to install the software.

(True/False)
4.7/5
(27)

Jordanna recently lost a lot of data when a virus attacked her computer system. She is coming up with a backup plan to minimize future data loss. Jordanna knows that a ____ is a bootable disk that contains a complete copy of your computer's hard drive as it existed when shipped from the manufacturer.

(Multiple Choice)
4.9/5
(38)

A(n) ____________________ strip is an appliance designed to protect electrical devices from power problems but that does not contain a battery to keep the computer running.

(Short Answer)
4.9/5
(37)

The objective of ____ management is to help reduce downtime, and maintain the best working conditions.

(Multiple Choice)
4.8/5
(39)

A(n) password usually can be entered using a numeric keypad.

(True/False)
4.8/5
(22)

A ____ is a self-copying program that spreads by itself from one computer to another.

(Multiple Choice)
4.9/5
(37)

A keylogger is a(n) ____.

(Multiple Choice)
4.8/5
(41)

  The item in the accompanying figure is used to protect your computer from ____. The item in the accompanying figure is used to protect your computer from ____.

(Multiple Choice)
5.0/5
(44)

Black hats and crackers are ____.

(Multiple Choice)
4.8/5
(38)

  Technology like the kind shown in the accompanying figure is an example of a ____________________ identification system. Technology like the kind shown in the accompanying figure is an example of a ____________________ identification system.

(Short Answer)
4.7/5
(33)

A Remote Access Trojan allows hackers to transmit files to victims' computers, search for data, run programs, and use a victim's computer as a relay station for breaking into other computers.

(True/False)
4.8/5
(34)

Even a brief interruption in power can force your computer to lose all data in ROM.

(True/False)
4.9/5
(44)

____ are rules that limit access to directories and files.

(Multiple Choice)
4.9/5
(23)

A key characteristic of a(n) ____ is the ability to lurk in a computer for days or months, quietly copying itself.

(Multiple Choice)
4.8/5
(36)

What are five tips for preventing computer theft?

(Essay)
4.7/5
(32)

Security experts use the term mixed threat to describe malware that combines more than one type of malicious program.

(True/False)
4.9/5
(40)
Showing 21 - 40 of 71
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)