Exam 5: Protecting Your Computer

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Black hat hackers are also known as crackers . _________________________

(True/False)
4.9/5
(32)

Spyware can change system settings, interrupt programs, and slow your computer's performance. _________________________

(True/False)
4.8/5
(31)

A(n)____ is programming code that performs a series of commands and can be embedded in a Web page.

(Multiple Choice)
4.8/5
(32)

If you want to keep information about your Web browsing private, you can use Microsoft Edge's ____ feature.

(Multiple Choice)
4.9/5
(45)

Microsoft Edge 's ____________________ feature prevents Microsoft Edge from storing data about your browsing session.

(Short Answer)
4.9/5
(41)

A Windows ____ is a collection of information that indicates the files and folders you can access, the types of changes you can make to the computer, and your preferred appearance settings.

(Multiple Choice)
4.9/5
(41)

A voucher is a digital document that verifies the security of a Web site you visit.

(True/False)
4.8/5
(37)

Most antivirus programs inoculate suspicious files in a safely segregated location so you can choose to restore or delete them. _________________________

(True/False)
4.8/5
(40)

____ can install itself on your computer without your knowledge or consent, and monitors your computing activities to collect information about you.

(Multiple Choice)
4.8/5
(37)

____________________ a computer means you verify that you have an account on that computer.

(Short Answer)
4.9/5
(44)

An update is a change to software that can prevent or repair problems, enhance the security of a computer, or improve a computer's performance.

(True/False)
4.9/5
(30)

____________________ analyzes the content of Web pages you visit. If it finds content that is used on other Web sites, it blocks the content from Web sites that appear on its lists.

(Short Answer)
4.9/5
(39)

When Windows Defender detects suspicious software, it displays a dialog box where you can choose the ____ option, for example.

(Multiple Choice)
4.9/5
(45)

Windows Defender ____ files that might be spyware.

(Multiple Choice)
4.7/5
(32)

If you want to keep information about your Web browsing private, you can use InPrivate Browsing.

(True/False)
4.7/5
(38)

If attackers access your system through a Trojan horse, they might install a(n)____________________, which is malware that gains administrator-level, or root-level, access to a computer or network without the system or users detecting its presence.

(Short Answer)
4.8/5
(44)

Your best protection against malware is to use the current version of ____.

(Multiple Choice)
4.8/5
(47)

When you use ____________________, Windows periodically checks for changes to the operating system from Microsoft.

(Short Answer)
4.9/5
(28)

People who create and send malware are called ____.

(Multiple Choice)
5.0/5
(42)

____ updates usually enhance your computing experience and repair problems that are not considered critical.

(Multiple Choice)
4.8/5
(41)
Showing 41 - 60 of 75
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)