A) updating your antivirus software
B) placing a found virus in a secure area on the hard drive
C) repairing an infected file
D) deleting an infected file
Correct Answer
verified
Multiple Choice
A) A worm
B) A time bomb
C) A script virus
D) An e-mail virus
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) sharing flash drives
B) downloading video files from peer-to-peer sites
C) downloading or running an e-mail attachment file
D) printing a document
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) programs that allow hackers to gain access to your computer without your knowledge
B) malware on your computer used to convince you that your computer has a virus
C) a computer controlled by a hacker
D) sending e-mails to people known to be customers of a company in an effort to get individuals to reveal sensitive data
E) transmits information about you, such as your Internet-surfing habits
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Cookies obtain your personal information by searching your hard drive.
B) Cookies are text files.
C) Cookies help companies determine the traffic flow through their website.
D) Some companies sell the personal information found in cookies to other companies.
Correct Answer
verified
Multiple Choice
A) firehouse
B) firebreak
C) firewall
D) fire extinguisher
Correct Answer
verified
Multiple Choice
A) program that generates distorted text and requires that it be typed into a box
B) reads a unique personal characteristic and converts its pattern to a digital code
C) hardware or software for protecting computers from hackers
D) a computer's identity on the Internet
E) method for selectively allowing certain requests to access ports
Correct Answer
verified
Multiple Choice
A) Social networking
B) Cybercrime
C) Phishing
D) Hacking
Correct Answer
verified
Short Answer
Correct Answer
verified
Short Answer
Correct Answer
verified
Short Answer
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Stealth
B) Multipartite
C) Polymorphic
D) Worm
Correct Answer
verified
Showing 1 - 20 of 75
Related Exams