Exam 9: Securing Your System: Protecting Your Digital Data and Devices
Exam 1: Using Technology to Change the World72 Questions
Exam 2: Looking at Computers: Understanding the Parts75 Questions
Exam 3: Using the Internet: Making the Most of the Webs Resources75 Questions
Exam 4: Application Software: Programs That Let You Work and Play75 Questions
Exam 5: System Software: the Operating System, Utility Programs, and File Management74 Questions
Exam 6: Understanding and Assessing Hardware: Evaluating Your System75 Questions
Exam 7: Networking: Connecting Computing Devices75 Questions
Exam 8: Digital Devices and Media: Managing a Digital Lifestyle75 Questions
Exam 9: Securing Your System: Protecting Your Digital Data and Devices75 Questions
Exam 10: Behind the Scenes: Software Programming75 Questions
Exam 11: Behind the Scenes: Databases and Information Systems75 Questions
Exam 12: Behind the Scenes: Networking and Security in the Business World75 Questions
Exam 13: Behind the Scenes: How the Internet Works75 Questions
Exam 14: Tif 1: the History of the Personal Computer38 Questions
Exam 15: Tif 2: Information Technology Ethics37 Questions
Exam 16: Tif 3: Under the Hood38 Questions
Exam 17: Tif 4: Careers in It38 Questions
Select questions type
A(n) ________ can help block unwanted, unsolicited e-mail.
Free
(Short Answer)
4.8/5
(32)
Correct Answer:
spam filter
A worm does NOT require human interaction to spread to other computers.
Free
(True/False)
4.8/5
(38)
Correct Answer:
True
A ________ is named after a housing construction feature that slows the spread of fires from house to house.
Free
(Multiple Choice)
4.9/5
(32)
Correct Answer:
C
All of the following were top cybercrimes reported to the IC3 in 2012 EXCEPT ________.
(Multiple Choice)
4.8/5
(31)
You should use the same password for each system or website you need to access.
(True/False)
4.8/5
(36)
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
(Multiple Choice)
4.7/5
(28)
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
(Short Answer)
4.9/5
(30)
Match each of the following terms to its meaning:
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(29)
Rules for creating passwords include all of the following EXCEPT ________.
(Multiple Choice)
4.8/5
(33)
A(n) ________-hat hacker illegally penetrates a system simply to demonstrate the hacker's expertise to the system administrator.
(Short Answer)
4.9/5
(32)
Devices that use a unique personal characteristic, such as a fingerprint, in place of a password are called ________ authentication devices.
(Short Answer)
4.9/5
(31)
A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT ________.
(Multiple Choice)
4.9/5
(33)
________ floods a computer with requests until it shuts down and refuses to answer any requests for information.
(Multiple Choice)
4.9/5
(38)
A(n) ________ is the portion of virus code that is unique to a particular computer virus.
(Multiple Choice)
4.9/5
(28)
________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities.
(Multiple Choice)
4.7/5
(36)
One virus called ________ is used to trick users into downloading an infected file to their phones, which enables theft of online banking information.
(Short Answer)
4.8/5
(42)
Match each of the following terms to its meaning:
Correct Answer:
Premises:
Responses:
(Matching)
4.7/5
(26)
Match each of the following terms to its meaning:
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(35)
Showing 1 - 20 of 75
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)