Filters
Question type

Study Flashcards

Regarding computer protection, quarantining is defined as ________.


A) updating your antivirus software
B) placing a found virus in a secure area on the hard drive
C) repairing an infected file
D) deleting an infected file

Correct Answer

verifed

verified

B

Which type of virus was the famous Michelangelo virus?


A) A worm
B) A time bomb
C) A script virus
D) An e-mail virus

Correct Answer

verifed

verified

A worm does NOT require human interaction to spread to other computers.

Correct Answer

verifed

verified

A time bomb virus can be triggered on a certain date.

Correct Answer

verifed

verified

Unwanted, unsolicited e-mail is referred to as ________.

Correct Answer

verifed

verified

spam

All of the following activities may infect your computer with a virus EXCEPT ________.


A) sharing flash drives
B) downloading video files from peer-to-peer sites
C) downloading or running an e-mail attachment file
D) printing a document

Correct Answer

verifed

verified

To create a secure password, you should use a mixture of uppercase letters, lowercase letters, numbers, and symbols.

Correct Answer

verifed

verified

Match each of the following terms to its meaning: I. spear phishing II. rootkit III. scareware IV. zombie V. spyware


A) programs that allow hackers to gain access to your computer without your knowledge
B) malware on your computer used to convince you that your computer has a virus
C) a computer controlled by a hacker
D) sending e-mails to people known to be customers of a company in an effort to get individuals to reveal sensitive data
E) transmits information about you, such as your Internet-surfing habits

Correct Answer

verifed

verified

All viruses cause serious destruction of computer data.

Correct Answer

verifed

verified

Virtual private networks (VPNs) are secure networks that are established without using the public Internet infrastructure.

Correct Answer

verifed

verified

False

Creating and spreading online viruses is a cybercrime.

Correct Answer

verifed

verified

Which of the following statements about cookies is NOT true?


A) Cookies obtain your personal information by searching your hard drive.
B) Cookies are text files.
C) Cookies help companies determine the traffic flow through their website.
D) Some companies sell the personal information found in cookies to other companies.

Correct Answer

verifed

verified

In computing, a ________ is named after a housing construction feature that slows the spread of fires from house to house.


A) firehouse
B) firebreak
C) firewall
D) fire extinguisher

Correct Answer

verifed

verified

Match each of the following terms to its meaning: I. packet filtering II. IP address III. firewall IV. CAPTCHA V. biometric authentication device


A) program that generates distorted text and requires that it be typed into a box
B) reads a unique personal characteristic and converts its pattern to a digital code
C) hardware or software for protecting computers from hackers
D) a computer's identity on the Internet
E) method for selectively allowing certain requests to access ports

Correct Answer

verifed

verified

Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?


A) Social networking
B) Cybercrime
C) Phishing
D) Hacking

Correct Answer

verifed

verified

Victims of ________ can spend months, or even years, trying to repair their credit and eliminate fraudulent debts.

Correct Answer

verifed

verified

Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.

Correct Answer

verifed

verified

A(n) ________ virus temporarily erases its code from the files where it resides, and then hides in the active memory of the computer.

Correct Answer

verifed

verified

Since you can always redownload program files, you do not need to include them in backups.

Correct Answer

verifed

verified

Which of the following classifications of viruses can change its own code to avoid detection?


A) Stealth
B) Multipartite
C) Polymorphic
D) Worm

Correct Answer

verifed

verified

Showing 1 - 20 of 75

Related Exams

Show Answer