Exam 9: Securing Your System: Protecting Your Digital Data and Devices
Exam 1: Using Technology to Change the World75 Questions
Exam 2: Looking at Computers: Understanding the Parts78 Questions
Exam 3: Using the Internet: Making the Most of the Webs Resources79 Questions
Exam 4: Application Software: Programs That Let You Work and Play76 Questions
Exam 5: System Software: The Operating System, Utility Programs, and File Management73 Questions
Exam 6: Understanding and Assessing Hardware: Evaluating Your System76 Questions
Exam 7: Networking: Connecting Computing Devices75 Questions
Exam 8: Managing a Digital Lifestyle: Media and Ethics75 Questions
Exam 9: Securing Your System: Protecting Your Digital Data and Devices75 Questions
Select questions type
Unwanted, unsolicited e-mail is referred to as ________.
Free
(Short Answer)
4.9/5
(35)
Correct Answer:
spam
Virtual private networks (VPNs) are secure networks that are established without using the public Internet infrastructure.
Free
(True/False)
4.8/5
(38)
Correct Answer:
False
Regarding computer protection, quarantining is defined as ________.
Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
B
A(n) ________ virus temporarily erases its code from the files where it resides, and then hides in the active memory of the computer.
(Short Answer)
4.8/5
(27)
Match each of the following terms to its meaning:
I. packet filtering
II. IP address
III. firewall
IV. CAPTCHA
V. biometric authentication device
(Multiple Choice)
4.9/5
(39)
All of the following activities may infect your computer with a virus EXCEPT ________.
(Multiple Choice)
4.9/5
(40)
Match each of the following terms to its meaning:
I. spear phishing
II. rootkit
III. scareware
IV. zombie
V. spyware
(Multiple Choice)
5.0/5
(38)
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
(Short Answer)
4.8/5
(33)
In computing, a ________ is named after a housing construction feature that slows the spread of fires from house to house.
(Multiple Choice)
4.8/5
(33)
A worm does NOT require human interaction to spread to other computers.
(True/False)
4.7/5
(41)
Victims of ________ can spend months, or even years, trying to repair their credit and eliminate fraudulent debts.
(Short Answer)
4.9/5
(36)
Which of the following classifications of viruses can change its own code to avoid detection?
(Multiple Choice)
4.8/5
(40)
Since you can always redownload program files, you do not need to include them in backups.
(True/False)
4.9/5
(38)
To create a secure password, you should use a mixture of uppercase letters, lowercase letters, numbers, and symbols.
(True/False)
4.8/5
(41)
Which of the following statements about cookies is NOT true?
(Multiple Choice)
4.9/5
(37)
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?
(Multiple Choice)
4.9/5
(36)
Showing 1 - 20 of 75
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)