Exam 6: Security and Privacy
Exam 1: Introduction to Computers and the Internet74 Questions
Exam 2: Computer Hardware78 Questions
Exam 3: Computer Software75 Questions
Exam 4: Computer Networks75 Questions
Exam 5: The Internet and Email75 Questions
Exam 6: Security and Privacy74 Questions
Exam 7: Exploring Windows 10 and Managing Files82 Questions
Exam 8: Using Edge Mail and People74 Questions
Exam 9: Introducing Microsoft Office 201674 Questions
Exam 10: Creating a Document74 Questions
Exam 11: Formatting a Long Document74 Questions
Exam 12: Enhancing a Document74 Questions
Exam 13: Creating a Workbook74 Questions
Exam 14: Working With Formulas and Functions77 Questions
Exam 15: Creating an Advanced Workbook74 Questions
Exam 16: Inserting and Formatting Charts74 Questions
Exam 17: Creating a Database74 Questions
Exam 18: Maintaining and Querying a Database74 Questions
Exam 19: Creating Forms and Reports74 Questions
Exam 20: Creating Apresentation76 Questions
Exam 21: Enhancing a Presentation74 Questions
Exam 22: Integrating Word, Excel, Access and Powerpoint74 Questions
Select questions type
Antivirus can infect any device, including personal computers, smartphones, tablets, and printers that contain computing hardware and software.
(True/False)
4.7/5
(36)
Leslie, a computer hacker, creates a game using malware code for desktop computers. Once users download the game, the malware infects their devices without their knowledge. The type of malware Leslie has programmed into the game is a _____.
(Multiple Choice)
4.9/5
(31)
Matthew faces some network issues with his office system. As the IT help desk team of his company is on leave, he accesses the server room himself and rectifies the problem. However, only the help desk members are allowed to enter the server room. In this scenario, Matthew can be accused of _____.
(Multiple Choice)
4.8/5
(43)
Tracy defaced her school's Web site and posted some irrelevant information on it. This is an example of _____.
(Multiple Choice)
4.8/5
(40)
_________ is the theft of information located on or being sent from a computer or other device.
A)Data theft
B)Identity theft
C)Character theft
D)Cyber theft
(Short Answer)
4.9/5
(32)
A user has to provide a valid password to gain access to a vault in a bank. In addition to this, the vault opens only when the user's fingerprint matches the fingerprint data stored in the database or when a valid smartcard is swiped. The authentication method used here is _____.
(Multiple Choice)
4.8/5
(36)
_____ refers to unsolicited email sent to a large group of individuals at one time.
(Multiple Choice)
4.7/5
(42)
Lia, a project manager at a reputed firm, wants to schedule a meeting with the top management immediately to discuss a high-priority issue. Lia should use _____ to determine the availability status of the concerned people.
(Multiple Choice)
4.8/5
(36)
Sara , the chief finance officer of a consulting firm, wants data to be automatically encrypted when stored on her hard drive. To accomplish this, she must use _____.
(Multiple Choice)
4.9/5
(32)
Repeated threats or other malicious behavior that pose a credible threat of harm carried out online is referred to as DNS spoofing.
(True/False)
4.7/5
(29)
Case 5-1 Luke is frustrated as he is often criticized by his employer for not meeting deadlines. He decides to take revenge on his employer for criticizing him in front of all his peers.
Luke asks his friends in the organization to flood the network server by sending it unsolicited requests. He does this to avoid being suspected by his employer. This act of sabotage is called _____.
(Multiple Choice)
4.7/5
(39)
John has a laptop that has survived many drops over concrete and withstood extreme temperature variations . John's laptop can be categorized as a _____.
(Multiple Choice)
4.8/5
(28)
A _____ creates a barrier between a computer or a network and the Internet in order to protect against unauthorized access.
(Multiple Choice)
4.8/5
(35)
A sender's private key is used to acknowledge a document, and that key, along with the contents of the document, generates a unique _____.
(Multiple Choice)
4.9/5
(38)
The purpose of a digital certificate is to authenticate the identity of an individual or organization.
(True/False)
4.8/5
(34)
Social networking sites have privacy features that can be used to protect the private information of their members.
(True/False)
4.7/5
(41)
A group of bots that are controlled by one individual and can work together in a coordinated fashion is called a _____.
(Multiple Choice)
4.8/5
(34)
The best protection against many dot cons is to protect any identifying information about oneself that could be used in fraudulent activities.
(True/False)
4.8/5
(36)
Phil decides to sell his personal computer to buy a new laptop, so he deletes all the data on his hard drive. To ensure that the data on his hard drive cannot be recovered using any special software, he _____ the hard drive-overwrites the hard drive several times using a disk erasing software-before the selling the system.
(Multiple Choice)
4.8/5
(25)
Showing 41 - 60 of 74
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)