Chapter 9 quizzes

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

false

Encrypting data is not an appropriate measure for mobile devices such as smartphones. A. True B. False

true

Sending emails to lure people into revealing personal information is a technique known as phishing. A. True B. False

action center

The Windows____ helps keep you aware of potential security issues and other major events on your device. A. Defender Center B. Malware Center C. Action Center D. Security Center

system image

The ___ utility allows you to create a copy of your entire hard drive on an external hard drive. A. Backup and Restore B. Scan Disk C. Disk Copy D. System Image

patches

Updates that you can download to fix possible security issues are called software____. A. Patches B. Repairs C. Bandages D. Reboots

adobe

Which of the following is NOT a major antivirus software company (as mentioned in this Sound Byte)? A. McAfee B. Symantec C. Kaspersky D. Adobe

malware fraud

Which of the following is NOT a major type of cybercrime reported to the IC3? A. Malware fraud B. Government impersonation C. Identity theft D. Advance fee fraud

launching a denial of service (DOS) attack

Which of the following is NOT one of the basic functions of malware? A. Gathering personal information about you B. Launching a denial of service (DOS) attack C. Aggressive Advertising D. Tracking your surfing habits

it prevents denial of service (DOS) attacks

Which of the following statements about Windows Defender is FALSE? A. It defends against pop-ups. B. It is included with Windows. C. It prevents denial of service (DOS) attacks. D. It defends against malware.

all pop-ups are annoying and useless

Which of the following statements about pop-ups is FALSE? A. all pop-ups are annoying and useless B. Pop-ups can contain advertising information. C. Some pop-ups are needed for useful features on a website. D. Pop-up blocking cannot be turned off in the Edge browser.

true

Your social security number should never be shared on a website, in an email, or through messaging. A. True B. False

save you device if a voltage spike is sent through the electrical system

A surge protector may look like just another power strip, but it also can___. A.Prevent theft. B.Detect viruses. C.Help manage heat. D.Save your device if a voltage spike is sent through the electrical system.

recycle bin

After deletion (in Windows), your files are stored in the ____. A. Restore Point B. Backup Zone C. Recycle Bin D. Deleted Folder

biometrics

Authentication techniques that rely on personal biological traits are called A. Biometrics B. Botnets C. Scanners D. Trojan horses

all of the above

Computer viruses can be spread by____. A. Downloading and running a file attached to an email. B. Downloading a song from a peer-to-peer sharing site. C. Sharing flash drives. D. All of the above

network address translation

Firewalls use a process of _____ to assign IP addresses to the Devices internal to the network so hackers will not know what they are. A. Port blocking B. VPN C. Packet filtering D. Network address translation (NAT)

windows system restore

If your system becomes unstable, you can reset it to a configuration from a past date by using______. A. Windows Scan Disk B. Windows System Restore C. Windows System Archive Wizard D. Windows File History

all of the above

Malicious software (malware) includes the following: A. Adware B. Spyware C. Viruses D. All of the above

false

Password strength is solely determined by the length of the password. A. True B. False


Ensembles d'études connexes

Chapter 4: Fair Housing Laws (Study Prep Questions)

View Set

Family Code: Void and Voidable Marriages

View Set

Retirement Planning and Employee Benefits - Other Tax-Advantaged Retirement Plans

View Set

Hinkle Ch 20: Management of Patients with Chronic Pulmonary Disease

View Set

Codehs AP Computer Science A (Nitro) Iteration quiz

View Set

Week 11- Eukaryotic Gene Expression

View Set

Campaign 1: Unit 1 - Echo (English to Arabic)

View Set