Exam 9: Securing Your System: Protecting Your Digital Data and Devices
Exam 1: Using Technology to Change the World75 Questions
Exam 2: Looking at Computers: Understanding the Parts74 Questions
Exam 3: Using the Internet: Making the Most of the Web's Resources76 Questions
Exam 4: Application Software: Programs That Let You Work and Play74 Questions
Exam 6: Understanding and Assessing Hardware: Evaluating Your System75 Questions
Exam 7: Networking: Connecting Computing Devices75 Questions
Exam 8: Digital Devices and Media: Managing a Digital Lifestyle75 Questions
Exam 9: Securing Your System: Protecting Your Digital Data and Devices75 Questions
Exam 10: Behind the Scenes: Software Programming75 Questions
Exam 11: Behind the Scenes: Databases and Information Systems75 Questions
Exam 12: Behind the Scenes: Networking and Security in the Business World76 Questions
Exam 13: Behind the Scenes: How the Internet Works74 Questions
Exam 14: The History of the Personal Computer41 Questions
Exam 5: System Software: The Operating System, Utility Programs, and File Management73 Questions
Exam 15: Information Technology Ethics37 Questions
Exam 16: Under the Hood38 Questions
Exam 17: Careers in IT38 Questions
Select questions type
During the process of ________, the antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive.
Free
(Short Answer)
4.9/5
(35)
Correct Answer:
inoculation
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
Free
(Multiple Choice)
4.9/5
(42)
Correct Answer:
A
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?
Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
B
A(n)________ virus runs a program that searches for common data files, compresses them, and makes them unusable.
(Short Answer)
4.9/5
(43)
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
(Short Answer)
4.9/5
(35)
A macro virus is a virus that is attached to a file such as a Word document or Excel workbook.
(True/False)
4.8/5
(30)
With regard to computer protection, quarantining is defined as ________.
(Multiple Choice)
4.9/5
(40)
A(n)________ is composed of software programs known as bots, which run autonomously on a large number of zombie computers.
(Short Answer)
4.8/5
(24)
________ viruses are often transmitted by a flash drive left in a USB port.
(Multiple Choice)
4.8/5
(41)
A stealth virus is designed to infect multiple file types to fool the antivirus software.
(True/False)
4.9/5
(36)
Match each of the following terms to its meaning:
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(35)
A(n)________-hat hacker illegally penetrates a system simply to demonstrate the hacker's expertise to the system administrator.
(Short Answer)
4.9/5
(35)
All of the following were top cybercrimes reported to the IC3 in 2013 EXCEPT ________.
(Multiple Choice)
4.9/5
(39)
Spyware programs that monitor keystrokes with the intent of stealing passwords, login IDs, or credit card information are referred to as ________.
(Short Answer)
4.9/5
(40)
Match each of the following terms to its meaning:
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(34)
A(n)________ virus temporarily erases its code from the files where it resides, and then hides in the active memory of the computer.
(Short Answer)
4.9/5
(32)
A(n)________ virus is a series of commands that is executed without your knowledge.
(Short Answer)
4.8/5
(33)
Showing 1 - 20 of 75
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)