Exam 6: Data Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____ is the term used to describe terrorist acts committed via the Internet.

Free
(Multiple Choice)
5.0/5
(34)
Correct Answer:
Verified

B

  Which of the following statements it NOT true about the figure shown above? Which of the following statements it NOT true about the figure shown above?

Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
Verified

D

When storing your backup files on a LAN, consider each of the following EXCEPT ____:

Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
Verified

D

MTBF is a rating that attempts to measure the time before a(n)____ failure occurs.

(Multiple Choice)
4.7/5
(33)

  In the figure above, the worm enters the original host and other unprotected hosts using ____. In the figure above, the worm enters the original host and other unprotected hosts using ____.

(Multiple Choice)
4.8/5
(35)

  The device shown in the figure above provides the best protection against power problems. What is the name for this device? The device shown in the figure above provides the best protection against power problems. What is the name for this device?

(Multiple Choice)
4.9/5
(23)

A ____ contains your computer's settings.

(Multiple Choice)
4.8/5
(30)

Which of the following is NOT an appliance designed to protect electrical devices from power surges and voltage spikes?

(Multiple Choice)
4.8/5
(29)

  Windows Vista includes firewall software, as shown above, and can be configured from the Support Center. Windows Vista includes firewall software, as shown above, and can be configured from the Support Center.

(True/False)
4.8/5
(33)

The Windows ____ is a file that stores configuration information about the devices and software installed on a computer system.

(Multiple Choice)
4.7/5
(40)

A ____ is a program that seems to perform one function, while actually doing something else.

(Multiple Choice)
4.9/5
(34)

  The power strip shown in the figure above is an appliance designed to protect electrical devices from power surges and voltage spikes. The power strip shown in the figure above is an appliance designed to protect electrical devices from power surges and voltage spikes.

(True/False)
4.9/5
(34)

A(n)____ backup contains a copy of every program, data, and system file on a computer.

(Multiple Choice)
4.9/5
(33)

Which of the following is NOT true about bots?

(Multiple Choice)
4.7/5
(30)

____ is a type of program that secretly gathers personal information without the victim's knowledge, usually for advertising and other commercial purposes.

(Multiple Choice)
4.9/5
(38)

A ____ is a person who controls many bot-infested computers.

(Multiple Choice)
4.9/5
(38)

A facility that is designed to house and protect a computer system and its data is called a(n)____ center.

(Multiple Choice)
4.9/5
(38)

List three ways to prevent your computer from becoming infected by malware.

(Essay)
4.9/5
(29)

A password ____________________ is utility software that generates secure passwords and stores them along with user IDs.

(Short Answer)
4.8/5
(34)

Biometrics is a method of authentication used to confirm a person's identity based on some physical trait.

(True/False)
4.8/5
(36)
Showing 1 - 20 of 91
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)