Exam 5: Data Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A power ____ is a complete loss of power to the computer system.

(Multiple Choice)
4.8/5
(36)

A recovery disk contains a complete copy of your computer's hard drive, including your data files and software you installed.

(True/False)
4.8/5
(47)

  Crackers , like the kind shown in the accompanying figure, are messages containing information about the user sent from a Web server to a browser and stored on the user's hard drive. Crackers , like the kind shown in the accompanying figure, are messages containing information about the user sent from a Web server to a browser and stored on the user's hard drive.

(True/False)
4.8/5
(29)

____ spikes can damage sensitive computer parts.

(Multiple Choice)
4.8/5
(33)

Hackers can spread worms over file-sharing networks and instant messaging links.

(True/False)
4.9/5
(40)

  The accompanying figure shows an example of a ____. The accompanying figure shows an example of a ____.

(Multiple Choice)
4.9/5
(29)

  The application shown in the accompanying figure is an example of a(n) ____. The application shown in the accompanying figure is an example of a(n) ____.

(Multiple Choice)
4.8/5
(35)

During startup, if your computer's screen remains blank or an error message appears, you may have a ____.

(Multiple Choice)
4.8/5
(30)

____ is an email or IM-based scam designed to persuade you to reveal confidential information.

(Multiple Choice)
4.9/5
(37)

A ____ is the basis for encrypting and decrypting the data transmitted between wireless devices.

(Multiple Choice)
4.9/5
(35)

Kyle is training a new employee named Mira on how to set up measures to protect the computers and systems in their company. Kyle tells his co-worker Mira that to avoid malware, she should avoid all of the following EXCEPT ____.

(Multiple Choice)
4.7/5
(35)

A(n) ____________________ probe is the use of automated software to locate computers that are vulnerable to unauthorized access.

(Short Answer)
4.8/5
(30)

In Safe Mode, you can use the Control Panel to uninstall recently added programs or hardware.

(True/False)
4.8/5
(35)

Jordanna recently lost a lot of data when a virus attacked her computer system. She is coming up with a backup plan to minimize future data loss. Jordanna uses her Windows installation CD as a ____, because it contains the operating system files needed to boot her computer without accessing the hard drive.

(Multiple Choice)
4.8/5
(39)

Spam is email generated by marketing firms using e-mail addresses from mailing lists, membership applications, and Web sites.

(True/False)
4.7/5
(38)

A ____ attack is when hackers intercept information sent out over networks.

(Multiple Choice)
4.9/5
(42)

One advantage of using a network server for backup is that you do not need to be connected to the network server in order to backup or retrieve your files.

(True/False)
4.8/5
(41)

A(n) ____ is a computer that carries out instructions without the knowledge of the computer owner.

(Multiple Choice)
4.9/5
(36)

A(n) ____ is software that can automate a task or autonomously execute a task when commanded to do so.

(Multiple Choice)
4.8/5
(39)

One of the biggest security threats to your computer is the result of malicious code, called ____________________.

(Short Answer)
4.7/5
(44)
Showing 41 - 60 of 71
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)