Exam 9: Securing Your System: Protecting Your Digital Data and Devices

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A(n) ________ virus runs a program that searches for common types of data files, compresses them, and makes them unusable.

(Short Answer)
4.8/5
(31)

A stealth virus is designed to infect multiple file types to fool the antivirus software.

(True/False)
4.9/5
(35)

A denial-of-service attack can be used to deny hackers access to a computer system.

(True/False)
4.8/5
(33)

A(n) ________ backup backs up only the files on a computer that have changed since the last time a backup was performed.

(Short Answer)
4.7/5
(34)

________ alarm software is an inexpensive theft deterrent for mobile devices.

(Short Answer)
4.9/5
(37)

An encryption virus replicates itself onto a hard drive's master boot record.

(True/False)
4.9/5
(36)

During the process of ________, antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive.

(Short Answer)
4.8/5
(40)

Match each of the following terms to its meaning: I. grey-hat hacker II. black-hat hacker III. cyberloafing IV. social engineering V. white-hat hacker

(Multiple Choice)
5.0/5
(20)

________ is a program that gathers information about your surfing habits without your knowledge.

(Multiple Choice)
4.8/5
(42)

You should use the same password for each system or website you need to access.

(True/False)
4.7/5
(38)

When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________.

(Multiple Choice)
4.8/5
(39)

Rules for creating passwords include all of the following EXCEPT ________.

(Multiple Choice)
4.8/5
(35)

________ is malware that tries to convince you that your computer is infected with a virus.

(Short Answer)
4.8/5
(32)

Using your computer for non-work activities while you are being paid to work is known as ________.

(Multiple Choice)
4.9/5
(39)

Viruses, adware and spyware are referred to collectively as ________.

(Multiple Choice)
4.9/5
(38)

A(n) ________ can help block unwanted, unsolicited e-mail.

(Short Answer)
4.7/5
(28)

A macro virus is a virus that is attached to a file such as a Word document or Excel workbook.

(True/False)
4.8/5
(31)

A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT ________.

(Multiple Choice)
4.9/5
(39)

A(n) ________ virus is designed to infect multiple file types in an effort to fool antivirus software.

(Short Answer)
4.7/5
(22)

CAPTCHA is ________.

(Multiple Choice)
4.7/5
(26)
Showing 41 - 60 of 75
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)