Exam 9: Securing Your System: Protecting Your Digital Data and Devices
Exam 1: Using Technology to Change the World75 Questions
Exam 2: Looking at Computers: Understanding the Parts78 Questions
Exam 3: Using the Internet: Making the Most of the Webs Resources79 Questions
Exam 4: Application Software: Programs That Let You Work and Play76 Questions
Exam 5: System Software: The Operating System, Utility Programs, and File Management73 Questions
Exam 6: Understanding and Assessing Hardware: Evaluating Your System76 Questions
Exam 7: Networking: Connecting Computing Devices75 Questions
Exam 8: Managing a Digital Lifestyle: Media and Ethics75 Questions
Exam 9: Securing Your System: Protecting Your Digital Data and Devices75 Questions
Select questions type
A(n) ________ takes advantage of file transport methods, such as e-mail, to spread on its own.
(Multiple Choice)
4.7/5
(31)
Creating and distributing ________ is one of the most widespread types of cybercrimes.
(Multiple Choice)
4.9/5
(39)
A(n) ________-hat hacker illegally penetrates a system simply to demonstrate the hacker's expertise to the system administrator.
(Short Answer)
4.7/5
(38)
Match each of the following terms to its meaning:
I. worm
II. computer virus
III. encryption virus
IV. polymorphic virus
V. logic bomb
(Multiple Choice)
4.8/5
(31)
A(n) ________ is the portion of virus code that is unique to a particular computer virus.
(Multiple Choice)
4.8/5
(27)
A(n) ________ is composed of software programs known as bots, which run autonomously on a large number of zombie computers.
(Short Answer)
4.9/5
(40)
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.
(Multiple Choice)
4.8/5
(37)
Match each of the following terms to its meaning:
I. Trojan horse
II. pretexting
III. cookie
IV. botnet
V. time bomb
(Multiple Choice)
4.8/5
(30)
________ hackers break into systems legally for non-malicious reasons such as to test system security vulnerabilities.
(Multiple Choice)
4.9/5
(37)
Which is not one of the four key pieces of personal information you should protect from identity thieves?
(Multiple Choice)
4.8/5
(33)
All of the following are top cybercrimes reported to the IC3 EXCEPT ________.
(Multiple Choice)
4.8/5
(31)
For security reasons, you should be extremely wary of opening e-mail ________ such as Word files.
(Short Answer)
4.8/5
(28)
The best defense against viruses is to install ________ software, which is specifically designed to detect viruses and protect your computer and files from harm.
(Short Answer)
4.8/5
(31)
You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ________.
(Multiple Choice)
4.8/5
(35)
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
(Multiple Choice)
4.7/5
(38)
Showing 21 - 40 of 75
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)