Exam 5: Protecting Your Computer
Exam 1: Exploring the Basics of Microsoft Windows 1075 Questions
Exam 2: Organizing Your Files75 Questions
Exam 3: Personalizing Your Windows Environment75 Questions
Exam 4: Working With the Internet and Email75 Questions
Exam 5: Protecting Your Computer75 Questions
Exam 6: Searching for Information75 Questions
Exam 7: Managing Multimedia Files75 Questions
Exam 8: Connecting to Networks With Mobile Computing75 Questions
Exam 9: Maintaining Hardware and Software75 Questions
Exam 10: Improving Your Computers Performance75 Questions
Select questions type
A(n)____ is a digital document that verifies the security of a Web site you visit.
Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
C
Web ____ are transparent images that invisibly track Web site usage.
Free
(Multiple Choice)
4.8/5
(43)
Correct Answer:
C
You need to keep ____ in Windows Defender up to date.
Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
A
Windows Defender helps prevent malware from installing itself and running on your computer. _________________________
(True/False)
4.8/5
(27)
A quarantine is a transparent image that invisibly tracks Web site usage
(True/False)
4.7/5
(37)
A(n)____ password contains at least eight characters, is composed of words not found in a dictionary, and contains lowercase and uppercase letters, numbers, and symbols.
(Multiple Choice)
4.8/5
(24)
In the Customize Settings window for Windows Firewall, which of the following can you specify?
(Multiple Choice)
4.8/5
(31)
A web beacon is a Windows Defender action to isolate potential spyware .
(True/False)
4.7/5
(37)
When you visit a Web site with pop-up windows and the Pop-up Blocker is turned on, the ____ opens to display a message informing you that it blocked a pop-up window.
(Multiple Choice)
4.8/5
(27)
Sometimes pop-up ads may ____, or seize control of, your browser.
(Multiple Choice)
4.7/5
(36)
A(n)____ Web site is a fraudulent site posing as a legitimate one.
(Multiple Choice)
4.8/5
(37)
____ are windows that appear while you are viewing a Web page and advertise a product or service.
(Multiple Choice)
4.8/5
(33)
____________________ monitors your computing actions, usually while you are online, to collect information about you.
(Short Answer)
4.9/5
(32)
____ is an attempt to deceive you into revealing personal or financial information when you respond to an email message or visit a Web site.
(Multiple Choice)
4.8/5
(28)
Email hurdling is the practice of using vulnerabilities in your computer to send spam to other computers without your permission. _________________________
(True/False)
4.8/5
(26)
Name and describe the Microsoft Edge security features listed in the chapter.
(Essay)
4.8/5
(29)
Spammers may use your computer to send spam to other computers without your permission, a practice known as ____.
(Multiple Choice)
4.9/5
(31)
Which of the following is a Microsoft Edge security feature?
(Multiple Choice)
4.8/5
(33)
____ are electronic security marks that can be added to files. They identify the publisher of a file and verify that the file has not had its integrity compromised.
(Multiple Choice)
4.8/5
(31)
Showing 1 - 20 of 75
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)