Exam 9: Securing Your System: Protecting Your Digital Data and Devices

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Unwanted, unsolicited e-mail is referred to as ________.

Free
(Short Answer)
4.9/5
(35)
Correct Answer:
Verified

spam

Virtual private networks (VPNs) are secure networks that are established without using the public Internet infrastructure.

Free
(True/False)
4.8/5
(38)
Correct Answer:
Verified

False

Regarding computer protection, quarantining is defined as ________.

Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
Verified

B

A(n) ________ virus temporarily erases its code from the files where it resides, and then hides in the active memory of the computer.

(Short Answer)
4.8/5
(27)

A time bomb virus can be triggered on a certain date.

(True/False)
5.0/5
(38)

Match each of the following terms to its meaning: I. packet filtering II. IP address III. firewall IV. CAPTCHA V. biometric authentication device

(Multiple Choice)
4.9/5
(39)

All of the following activities may infect your computer with a virus EXCEPT ________.

(Multiple Choice)
4.9/5
(40)

Match each of the following terms to its meaning: I. spear phishing II. rootkit III. scareware IV. zombie V. spyware

(Multiple Choice)
5.0/5
(38)

Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.

(Short Answer)
4.8/5
(33)

In computing, a ________ is named after a housing construction feature that slows the spread of fires from house to house.

(Multiple Choice)
4.8/5
(33)

Creating and spreading online viruses is a cybercrime.

(True/False)
4.7/5
(34)

All viruses cause serious destruction of computer data.

(True/False)
4.8/5
(35)

A worm does NOT require human interaction to spread to other computers.

(True/False)
4.7/5
(41)

Victims of ________ can spend months, or even years, trying to repair their credit and eliminate fraudulent debts.

(Short Answer)
4.9/5
(36)

Which of the following classifications of viruses can change its own code to avoid detection?

(Multiple Choice)
4.8/5
(40)

Since you can always redownload program files, you do not need to include them in backups.

(True/False)
4.9/5
(38)

Which type of virus was the famous Michelangelo virus?

(Multiple Choice)
4.8/5
(31)

To create a secure password, you should use a mixture of uppercase letters, lowercase letters, numbers, and symbols.

(True/False)
4.8/5
(41)

Which of the following statements about cookies is NOT true?

(Multiple Choice)
4.9/5
(37)

Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?

(Multiple Choice)
4.9/5
(36)
Showing 1 - 20 of 75
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)