Exam 5: Data Security
Exam 1: Computer and Internet Basics71 Questions
Exam 2: Computer Hardware71 Questions
Exam 3: Computer Software71 Questions
Exam 4: File Management and Digital Electronics71 Questions
Exam 5: Data Security71 Questions
Exam 6: Networks and Connecting to the Internet71 Questions
Exam 7: The Web and E-Commerce71 Questions
Exam 8: Digital Media71 Questions
Exam 9: Technology, Careers, and Job Hunting71 Questions
Select questions type
The application in the accompanying figure is an example of a program that protects against ____.

(Multiple Choice)
4.8/5
(32)
In Safe Mode, you can use all of the following EXCEPT ____.
(Multiple Choice)
4.8/5
(38)
The information that antivirus software uses to identify and remove malware is referred to as a virus ____.
(Multiple Choice)
4.8/5
(37)
Kyle is training a new employee named Mira on how to set up measures to protect the computers and systems in their company. Kyle tells his co-worker Mira that which of the following is NOT true about cookies?
(Multiple Choice)
5.0/5
(24)
If a pop-up ad for a security suite opens on your computer, you should click on it to install the software.
(True/False)
4.7/5
(27)
Jordanna recently lost a lot of data when a virus attacked her computer system. She is coming up with a backup plan to minimize future data loss. Jordanna knows that a ____ is a bootable disk that contains a complete copy of your computer's hard drive as it existed when shipped from the manufacturer.
(Multiple Choice)
4.9/5
(38)
A(n) ____________________ strip is an appliance designed to protect electrical devices from power problems but that does not contain a battery to keep the computer running.
(Short Answer)
4.9/5
(37)
The objective of ____ management is to help reduce downtime, and maintain the best working conditions.
(Multiple Choice)
4.8/5
(39)
A ____ is a self-copying program that spreads by itself from one computer to another.
(Multiple Choice)
4.9/5
(37)
The item in the accompanying figure is used to protect your computer from ____.

(Multiple Choice)
5.0/5
(44)
Technology like the kind shown in the accompanying figure is an example of a ____________________ identification system.

(Short Answer)
4.7/5
(33)
A Remote Access Trojan allows hackers to transmit files to victims' computers, search for data, run programs, and use a victim's computer as a relay station for breaking into other computers.
(True/False)
4.8/5
(34)
Even a brief interruption in power can force your computer to lose all data in ROM.
(True/False)
4.9/5
(44)
A key characteristic of a(n) ____ is the ability to lurk in a computer for days or months, quietly copying itself.
(Multiple Choice)
4.8/5
(36)
Security experts use the term mixed threat to describe malware that combines more than one type of malicious program.
(True/False)
4.9/5
(40)
Showing 21 - 40 of 71
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)