Exam 5: Data Security
Exam 1: Computer and Internet Basics71 Questions
Exam 2: Computer Hardware71 Questions
Exam 3: Computer Software71 Questions
Exam 4: File Management and Digital Electronics71 Questions
Exam 5: Data Security71 Questions
Exam 6: Networks and Connecting to the Internet71 Questions
Exam 7: The Web and E-Commerce71 Questions
Exam 8: Digital Media71 Questions
Exam 9: Technology, Careers, and Job Hunting71 Questions
Select questions type
A power ____ is a complete loss of power to the computer system.
(Multiple Choice)
4.8/5
(36)
A recovery disk contains a complete copy of your computer's hard drive, including your data files and software you installed.
(True/False)
4.8/5
(47)
Crackers , like the kind shown in the accompanying figure, are messages containing information about the user sent from a Web server to a browser and stored on the user's hard drive.

(True/False)
4.8/5
(29)
Hackers can spread worms over file-sharing networks and instant messaging links.
(True/False)
4.9/5
(40)
The application shown in the accompanying figure is an example of a(n) ____.

(Multiple Choice)
4.8/5
(35)
During startup, if your computer's screen remains blank or an error message appears, you may have a ____.
(Multiple Choice)
4.8/5
(30)
____ is an email or IM-based scam designed to persuade you to reveal confidential information.
(Multiple Choice)
4.9/5
(37)
A ____ is the basis for encrypting and decrypting the data transmitted between wireless devices.
(Multiple Choice)
4.9/5
(35)
Kyle is training a new employee named Mira on how to set up measures to protect the computers and systems in their company. Kyle tells his co-worker Mira that to avoid malware, she should avoid all of the following EXCEPT ____.
(Multiple Choice)
4.7/5
(35)
A(n) ____________________ probe is the use of automated software to locate computers that are vulnerable to unauthorized access.
(Short Answer)
4.8/5
(30)
In Safe Mode, you can use the Control Panel to uninstall recently added programs or hardware.
(True/False)
4.8/5
(35)
Jordanna recently lost a lot of data when a virus attacked her computer system. She is coming up with a backup plan to minimize future data loss. Jordanna uses her Windows installation CD as a ____, because it contains the operating system files needed to boot her computer without accessing the hard drive.
(Multiple Choice)
4.8/5
(39)
Spam is email generated by marketing firms using e-mail addresses from mailing lists, membership applications, and Web sites.
(True/False)
4.7/5
(38)
A ____ attack is when hackers intercept information sent out over networks.
(Multiple Choice)
4.9/5
(42)
One advantage of using a network server for backup is that you do not need to be connected to the network server in order to backup or retrieve your files.
(True/False)
4.8/5
(41)
A(n) ____ is a computer that carries out instructions without the knowledge of the computer owner.
(Multiple Choice)
4.9/5
(36)
A(n) ____ is software that can automate a task or autonomously execute a task when commanded to do so.
(Multiple Choice)
4.8/5
(39)
One of the biggest security threats to your computer is the result of malicious code, called ____________________.
(Short Answer)
4.7/5
(44)
Showing 41 - 60 of 71
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)