Exam 9: Securing Your System: Protecting Your Digital Data and Devices
Exam 1: Using Technology to Change the World75 Questions
Exam 2: Looking at Computers: Understanding the Parts78 Questions
Exam 3: Using the Internet: Making the Most of the Webs Resources79 Questions
Exam 4: Application Software: Programs That Let You Work and Play76 Questions
Exam 5: System Software: The Operating System, Utility Programs, and File Management73 Questions
Exam 6: Understanding and Assessing Hardware: Evaluating Your System76 Questions
Exam 7: Networking: Connecting Computing Devices75 Questions
Exam 8: Managing a Digital Lifestyle: Media and Ethics75 Questions
Exam 9: Securing Your System: Protecting Your Digital Data and Devices75 Questions
Select questions type
A(n) ________ virus runs a program that searches for common types of data files, compresses them, and makes them unusable.
(Short Answer)
4.8/5
(31)
A stealth virus is designed to infect multiple file types to fool the antivirus software.
(True/False)
4.9/5
(35)
A denial-of-service attack can be used to deny hackers access to a computer system.
(True/False)
4.8/5
(33)
A(n) ________ backup backs up only the files on a computer that have changed since the last time a backup was performed.
(Short Answer)
4.7/5
(34)
________ alarm software is an inexpensive theft deterrent for mobile devices.
(Short Answer)
4.9/5
(37)
An encryption virus replicates itself onto a hard drive's master boot record.
(True/False)
4.9/5
(36)
During the process of ________, antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive.
(Short Answer)
4.8/5
(40)
Match each of the following terms to its meaning:
I. grey-hat hacker
II. black-hat hacker
III. cyberloafing
IV. social engineering
V. white-hat hacker
(Multiple Choice)
5.0/5
(20)
________ is a program that gathers information about your surfing habits without your knowledge.
(Multiple Choice)
4.8/5
(42)
You should use the same password for each system or website you need to access.
(True/False)
4.7/5
(38)
When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________.
(Multiple Choice)
4.8/5
(39)
Rules for creating passwords include all of the following EXCEPT ________.
(Multiple Choice)
4.8/5
(35)
________ is malware that tries to convince you that your computer is infected with a virus.
(Short Answer)
4.8/5
(32)
Using your computer for non-work activities while you are being paid to work is known as ________.
(Multiple Choice)
4.9/5
(39)
Viruses, adware and spyware are referred to collectively as ________.
(Multiple Choice)
4.9/5
(38)
A macro virus is a virus that is attached to a file such as a Word document or Excel workbook.
(True/False)
4.8/5
(31)
A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT ________.
(Multiple Choice)
4.9/5
(39)
A(n) ________ virus is designed to infect multiple file types in an effort to fool antivirus software.
(Short Answer)
4.7/5
(22)
Showing 41 - 60 of 75
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)