Exam 5: Protecting Your Computer

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A(n)____ is a digital document that verifies the security of a Web site you visit.

Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
Verified

C

Web ____ are transparent images that invisibly track Web site usage.

Free
(Multiple Choice)
4.8/5
(43)
Correct Answer:
Verified

C

You need to keep ____ in Windows Defender up to date.

Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
Verified

A

Windows Defender helps prevent malware from installing itself and running on your computer. _________________________

(True/False)
4.8/5
(27)

A quarantine is a  transparent image that invisibly tracks Web site usage ​

(True/False)
4.7/5
(37)

A service pack is a(n)____.

(Multiple Choice)
4.8/5
(30)

A(n)____ password contains at least eight characters, is composed of words not found in a dictionary, and contains lowercase and uppercase letters, numbers, and symbols.

(Multiple Choice)
4.8/5
(24)

In the Customize Settings window for Windows Firewall, which of the following can you specify?

(Multiple Choice)
4.8/5
(31)

A web beacon is a  Windows Defender action to isolate potential spyware ​.

(True/False)
4.7/5
(37)

When you visit a Web site with pop-up windows and the Pop-up Blocker is turned on, the ____ opens to display a message informing you that it blocked a pop-up window.

(Multiple Choice)
4.8/5
(27)

Sometimes pop-up ads may ____, or seize control of, your browser.

(Multiple Choice)
4.7/5
(36)

A(n)____ Web site is a fraudulent site posing as a legitimate one.

(Multiple Choice)
4.8/5
(37)

____ are windows that appear while you are viewing a Web page and advertise a product or service.

(Multiple Choice)
4.8/5
(33)

____________________ monitors your computing actions, usually while you are online, to collect information about you.

(Short Answer)
4.9/5
(32)

____ is an attempt to deceive you into revealing personal or financial information when you respond to an email message or visit a Web site.

(Multiple Choice)
4.8/5
(28)

Email hurdling is the practice of using vulnerabilities in your computer to send spam to other computers without your permission. _________________________

(True/False)
4.8/5
(26)

Name and describe the  Microsoft Edge  security features listed in the chapter.

(Essay)
4.8/5
(29)

Spammers may use your computer to send spam to other computers without your permission, a practice known as ____.

(Multiple Choice)
4.9/5
(31)

Which of the following is a Microsoft Edge security feature?

(Multiple Choice)
4.8/5
(33)

____ are electronic security marks that can be added to files. They identify the publisher of a file and verify that the file has not had its integrity compromised.

(Multiple Choice)
4.8/5
(31)
Showing 1 - 20 of 75
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)