Exam 5: Protecting Your Computer

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A(n)roadblock defends against malware trying to gain access to your computer by monitoring your network and Internet connection. _________________________

(True/False)
4.9/5
(27)

____________________ controls are small, self-contained programs downloaded from a Web page to your computer. They are often used to make it easier to perform tasks, but sometimes are used by hackers to distribute adware and spyware.

(Short Answer)
4.7/5
(37)

A Windows ____ account is primarily for people who need temporary access to a computer, and it is not used often.

(Multiple Choice)
4.9/5
(35)

____________________ is turned on by default, so it doesn't allow communications with most programs via the Internet or a network.

(Short Answer)
4.8/5
(37)

A ____ is malware that hides inside another program, such as a photo-viewing program that you download from the Web.

(Multiple Choice)
4.9/5
(46)

____________________ is an attempt to deceive you into revealing personal or financial information when you respond to an email message or visit a Web site.

(Short Answer)
4.9/5
(41)

Name and describe the security features in Windows 10.

(Essay)
4.8/5
(35)

The computer is vulnerable at the point of booting because antivirus software hasn't started yet.

(True/False)
4.9/5
(45)

A(n)____________________ Web site is a fraudulent site posing as a legitimate one.

(Short Answer)
4.9/5
(35)

A Trojan horse is malware that hides inside another program.

(True/False)
4.8/5
(35)

Secure Boot can detect when a file has interfered with the operating system and prevent that file from loading. _________________________

(True/False)
4.9/5
(35)

Microsoft Edge's ____ feature helps prevent Web site content providers from collecting information about sites you visit.

(Multiple Choice)
4.9/5
(36)

Another term for junk email is salami.

(True/False)
4.8/5
(43)

____________________ cookies are generated from the Web sites you visit and contain information the Web sites reuse when you return.

(Short Answer)
4.9/5
(34)

Pharming is an attempt to deceive you into revealing personal or financial information when you respond to an email message and visit a Web site. _________________________

(True/False)
4.8/5
(42)
Showing 61 - 75 of 75
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)