Exam 10: Computer Security and Risks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

When you visit certain Web sites,spyware may be automatically downloaded.This is called a

Free
(Multiple Choice)
4.7/5
(38)
Correct Answer:
Verified

D

An email message claiming your Facebook account has been hacked and you need to click on a link to restore your account is an example of a(n)________ email.

Free
(Short Answer)
4.7/5
(38)
Correct Answer:
Verified

phishing

When customers of a Web site are unable to access it due to a bombardment of fake traffic,it is known as

Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
Verified

D

Unauthorized access to computer systems is called

(Multiple Choice)
4.9/5
(33)

A virus that attaches itself to documents that contain macros is called a(n)

(Multiple Choice)
4.8/5
(35)

Hardware or software designed to guard against unauthorized access to a computer network is known as a(n)

(Multiple Choice)
4.8/5
(37)

________ are people who hijack legitimate Web pages and redirect users to other sites.

(Short Answer)
4.8/5
(33)

An attack that creates so much bogus traffic it shuts down a network is known by the acronym ________.

(Short Answer)
4.9/5
(39)

To prevent loss of data during power failures,use a(n)

(Multiple Choice)
4.9/5
(42)

Both viruses and ________ use computer hosts to replicate.

(Short Answer)
4.9/5
(35)

Of the following,which one is NOT a way to protect yourself from identity theft?

(Multiple Choice)
4.7/5
(32)

________ computers,or bots,are Internet-connected computers that have been hijacked using viruses to perform malicious acts without the knowledge of the computer owner.

(Short Answer)
4.9/5
(33)

Which statement is NOT true regarding antivirus programs?

(Multiple Choice)
4.8/5
(20)

Software programs that close potential security breaches in an operating system or application are known as

(Multiple Choice)
4.8/5
(44)

Worms execute until

(Multiple Choice)
4.9/5
(35)

Which law was used to silence Professor Edward Felton in 2001?

(Multiple Choice)
4.9/5
(39)

Which type of virus uses computer hosts to reproduce itself?

(Multiple Choice)
4.7/5
(27)

Collecting personal information and effectively posing as another individual is known as the crime of

(Multiple Choice)
4.7/5
(35)

Information can be recovered from a hard drive even after file have been deleted.

(True/False)
4.7/5
(34)

Which historical macro virus sent emails out to the first 50 names of a user's Outlook address book if they opened an email from an unknown sender?

(Multiple Choice)
4.9/5
(40)
Showing 1 - 20 of 84
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)