Exam 6: Data Security
Exam 1: Computer and Internet Basics91 Questions
Exam 2: Computer Hardware91 Questions
Exam 3: Computer Software91 Questions
Exam 4: Digital Electronics and File Management91 Questions
Exam 5: Networks and the Internet93 Questions
Exam 6: Data Security91 Questions
Exam 7: The Web and E-Commerce91 Questions
Exam 8: Digital Media91 Questions
Exam 9: The Computer Industry and Careers91 Questions
Exam 10: Trends in Technology61 Questions
Select questions type
A ____ is one term for someone who creates and unleashes malware.
(Multiple Choice)
4.8/5
(29)
When your personal data is used illegally, it is called ____________________.
(Short Answer)
5.0/5
(38)
You have just been hired as an assistant to the network administrator at a local company. You are asked to give a presentation on viruses, worms, bots, Trojans, and spyware and include the unauthorized activities the network might see if malware enters the company's network. Explain how a network traffic jam affects a network.
(Essay)
4.8/5
(28)
You have just been hired as an assistant to the network administrator at a local company. You are asked to give a presentation on viruses, worms, bots, Trojans, and spyware and include the unauthorized activities the network might see if malware enters the company's network. Users on the network are blocked from accessing certain Web sites, home page settings are being changed, and browsers are being redirected to infected Web sites. What is the likely problem?
(Essay)
4.8/5
(28)
Spam filters are not included in email clients and security suites.
(True/False)
4.9/5
(40)
Match the computer crime term with its definition.
Correct Answer:
Premises:
Responses:
(Matching)
4.7/5
(31)
Data security on a system that is guarded by user IDs and passwords depends on password ____.
(Multiple Choice)
4.8/5
(31)
A ____ virus infects the system files on your computer causing widespread damage to your hard drive.
(Multiple Choice)
4.8/5
(30)
A ____ is a message containing information about a user sent from a Web server to a browser and stored on the user's hard drive.
(Multiple Choice)
4.7/5
(43)
Which of the following is NOT typically included with a data center?
(Multiple Choice)
4.7/5
(35)
A power ____________________ is a complete loss of power to a computer system.
(Short Answer)
4.9/5
(31)
Showing 41 - 60 of 91
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)