Exam 10: Computer Security and Risks
Exam 1: Exploring Our Digital Planet133 Questions
Exam 2: Hardware Basics: Inside the Box146 Questions
Exam 3: Hardware Basics: Peripherals133 Questions
Exam 4: Software Basics: the Ghost in the Machine127 Questions
Exam 5: Productivity Applications118 Questions
Exam 6: Graphics, digital Media, and Multimedia110 Questions
Exam 7: Database Applications and Privacy Implications126 Questions
Exam 8: Networking and Digital Communication134 Questions
Exam 9: The Evolving Internet115 Questions
Exam 10: Computer Security and Risks84 Questions
Exam 11: Computers at Work, school, and Home96 Questions
Exam 12: Information Systems in Business129 Questions
Exam 13: E-Commerce and E-Business: the Evolving Internet Economy68 Questions
Exam 14: Systems Design and Development145 Questions
Exam 15: Is Artificial Intelligence Real80 Questions
Exam 16: Computer and Internet Terminology81 Questions
Select questions type
When you visit certain Web sites,spyware may be automatically downloaded.This is called a
Free
(Multiple Choice)
4.7/5
(38)
Correct Answer:
D
An email message claiming your Facebook account has been hacked and you need to click on a link to restore your account is an example of a(n)________ email.
Free
(Short Answer)
4.7/5
(38)
Correct Answer:
phishing
When customers of a Web site are unable to access it due to a bombardment of fake traffic,it is known as
Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
D
A virus that attaches itself to documents that contain macros is called a(n)
(Multiple Choice)
4.8/5
(35)
Hardware or software designed to guard against unauthorized access to a computer network is known as a(n)
(Multiple Choice)
4.8/5
(37)
________ are people who hijack legitimate Web pages and redirect users to other sites.
(Short Answer)
4.8/5
(33)
An attack that creates so much bogus traffic it shuts down a network is known by the acronym ________.
(Short Answer)
4.9/5
(39)
Of the following,which one is NOT a way to protect yourself from identity theft?
(Multiple Choice)
4.7/5
(32)
________ computers,or bots,are Internet-connected computers that have been hijacked using viruses to perform malicious acts without the knowledge of the computer owner.
(Short Answer)
4.9/5
(33)
Software programs that close potential security breaches in an operating system or application are known as
(Multiple Choice)
4.8/5
(44)
Which law was used to silence Professor Edward Felton in 2001?
(Multiple Choice)
4.9/5
(39)
Which type of virus uses computer hosts to reproduce itself?
(Multiple Choice)
4.7/5
(27)
Collecting personal information and effectively posing as another individual is known as the crime of
(Multiple Choice)
4.7/5
(35)
Information can be recovered from a hard drive even after file have been deleted.
(True/False)
4.7/5
(34)
Which historical macro virus sent emails out to the first 50 names of a user's Outlook address book if they opened an email from an unknown sender?
(Multiple Choice)
4.9/5
(40)
Showing 1 - 20 of 84
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)