Chapter 9 quizzes
false
Encrypting data is not an appropriate measure for mobile devices such as smartphones. A. True B. False
true
Sending emails to lure people into revealing personal information is a technique known as phishing. A. True B. False
action center
The Windows____ helps keep you aware of potential security issues and other major events on your device. A. Defender Center B. Malware Center C. Action Center D. Security Center
system image
The ___ utility allows you to create a copy of your entire hard drive on an external hard drive. A. Backup and Restore B. Scan Disk C. Disk Copy D. System Image
patches
Updates that you can download to fix possible security issues are called software____. A. Patches B. Repairs C. Bandages D. Reboots
adobe
Which of the following is NOT a major antivirus software company (as mentioned in this Sound Byte)? A. McAfee B. Symantec C. Kaspersky D. Adobe
malware fraud
Which of the following is NOT a major type of cybercrime reported to the IC3? A. Malware fraud B. Government impersonation C. Identity theft D. Advance fee fraud
launching a denial of service (DOS) attack
Which of the following is NOT one of the basic functions of malware? A. Gathering personal information about you B. Launching a denial of service (DOS) attack C. Aggressive Advertising D. Tracking your surfing habits
it prevents denial of service (DOS) attacks
Which of the following statements about Windows Defender is FALSE? A. It defends against pop-ups. B. It is included with Windows. C. It prevents denial of service (DOS) attacks. D. It defends against malware.
all pop-ups are annoying and useless
Which of the following statements about pop-ups is FALSE? A. all pop-ups are annoying and useless B. Pop-ups can contain advertising information. C. Some pop-ups are needed for useful features on a website. D. Pop-up blocking cannot be turned off in the Edge browser.
true
Your social security number should never be shared on a website, in an email, or through messaging. A. True B. False
save you device if a voltage spike is sent through the electrical system
A surge protector may look like just another power strip, but it also can___. A.Prevent theft. B.Detect viruses. C.Help manage heat. D.Save your device if a voltage spike is sent through the electrical system.
recycle bin
After deletion (in Windows), your files are stored in the ____. A. Restore Point B. Backup Zone C. Recycle Bin D. Deleted Folder
biometrics
Authentication techniques that rely on personal biological traits are called A. Biometrics B. Botnets C. Scanners D. Trojan horses
all of the above
Computer viruses can be spread by____. A. Downloading and running a file attached to an email. B. Downloading a song from a peer-to-peer sharing site. C. Sharing flash drives. D. All of the above
network address translation
Firewalls use a process of _____ to assign IP addresses to the Devices internal to the network so hackers will not know what they are. A. Port blocking B. VPN C. Packet filtering D. Network address translation (NAT)
windows system restore
If your system becomes unstable, you can reset it to a configuration from a past date by using______. A. Windows Scan Disk B. Windows System Restore C. Windows System Archive Wizard D. Windows File History
all of the above
Malicious software (malware) includes the following: A. Adware B. Spyware C. Viruses D. All of the above
false
Password strength is solely determined by the length of the password. A. True B. False