computer literacy chapter 9 help desk and sound bytes

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The Windows _____________ helps keep you aware of potential security issues and other major events on your device. 1. Defender Center ​2. Malware Center​ 3. Action Center ​​4. Security Center

Action Center

Which of the following is NOT a major antivirus software company (as mentioned in this Sound Byte)? 1. McAfee 2. Symantec 3. Kaspersky ​4. Adobe

Adobe

Which of the following statements about pop-ups is FALSE? 1. All pop-ups are annoying and useless. 2. Pop-ups can contain advertising information. 3. Some pop-ups are needed for useful features on a website. ​​4. Pop-up blocking cannot be turned off in the Edge browser.

All pop-ups are annoying and useless.

A computer controlled by a hacker is called a __________. 1. spybot 2. pharm ​3. zombie​ 4. Trojan horse

zombie​

What exactly is a virus? 1. A computer virus is a computer program that appears to be something useful or desirable (like a game or a screensaver), but at the same time does something malicious in the background without your knowledge, such as destroying your files. 2. A computer virus is a computer program that looks at packets as they travel on the Internet and infects them with debilitating code. 3. A computer virus is a computer program that attaches itself to another computer program and attempts to spread itself to other computers when files are exchanged. 4. A computer virus is a computer program deployed by hackers that looks at each packet as it travels on the Internet.

A computer virus is a computer program that attaches itself to another computer program and attempts to spread itself to other computers when files are exchanged.

But how will a firewall help if I'm not exchanging any valuable information over the Internet and don't have any important files on my computer? 1. A firewall protects your computer by blocking all the logical ports that allow data to come in. As long as you send and receive attachments over e-mail, you need a firewall. 2. A firewall protects your computer by screening data coming into the logical ports and confirming whether it's from a trusted source. Even if you don't store proprietary files on your computer, a hacker can steal personal information from your computer to commit identity theft. 3. A firewall protects your computer by blocking off access to all physical ports or communications gateways to the computer. It is in essence a packet filtering device that prevents hacker intrusion. 4. A firewall protects your computer by blocking access to all logical and physical ports.

A firewall protects your computer by screening data coming into the logical ports and confirming whether it's from a trusted source. Even if you don't store proprietary files on your computer, a hacker can steal personal information from your computer to commit identity theft.

What are logical ports? 1. A logical port is an external port that allows you to transfer data and make requests from other computers. 2. A logical port is like a filter fitted to your computer. The logical port checks to be sure that any information that you send or receive is logically acceptable. If it's not, it is rejected by the logical port. 3. A logical port is a virtual communications gateway that allows a computer to organize requests for information from other networks or computers. 4. A logical port is a large group of software programs that runs autonomously on zombie computers.

A logical port is a virtual communications gateway that allows a computer to organize requests for information from other networks or computers.

What else can hackers do? 1. Hackers can also launch an attack from your computer called a denial-of-service (DoS) attack. A DoS attack is an attack on your Disk Operating System. It enables the hacker to gain control of your OS by which he can create problems in the files stored in your unprotected computer. 2. Hackers can also launch an attack from your computer called a denial-of-service (DoS) attack. A DoS attack is actually a virus that attacks the hard drive, corrupting the files stored in your computer. 3. Hackers can also launch an attack from your computer called a denial of service (DoS) attack. A DoS attack is an attack on a computer system launched from an unprotected computer. 4. Hackers can also launch an attack from your computer called a denial-of-service (DoS) attack. A DoS attack is when the hacker uses your personal information for the purpose of defrauding you.

Hackers can also launch an attack from your computer called a denial of service (DoS) attack. A DoS attack is an attack on a computer system launched from an unprotected computer.

Besides committing identity theft, what else can hackers do? 1. Hackers can use Trojan horses to gain control of your computer without your knowledge. A Trojan horse is a program that appears to be something useful or desirable, but at the same time does something malicious in the background without your knowledge. 2. Hackers can use Trojan horses to gain control of your computer without your knowledge. A Trojan horse is an unwanted piggyback program run in the background of your system that gathers information about you, usually your Internet surfing habits, without your knowledge. 3. Hackers can use Trojan horses to gain control of your computer without your knowledge. A Trojan horse blocks all the logical ports in your computer without your permission. 4. Hackers can use Trojan horses to gain control of your computer without your knowledge. A Trojan horse blocks all the physical ports in your computer without your permission.

Hackers can use Trojan horses to gain control of your computer without your knowledge. A Trojan horse is a program that appears to be something useful or desirable, but at the same time does something malicious in the background without your knowledge.

Which of the following statements about Windows Defender is FALSE? 1. It defends against pop-ups. 2. It is included with Windows. 3. It prevents denial of service (DOS) attacks. ​​4. It defends against malware.

It prevents denial of service (DOS) attacks.

If my Microsoft Excel file is all garbled, could it have a virus? 1. It sounds like you definitely have a virus. You need to run antivirus software. 2. It sounds like it could be a virus, but it could also be another problem, such as a corrupt file. You should try to open other files in Excel first. 3. It sounds like your Excel application itself is corrupt. You should try to reinstall Excel. 4. Try to open your Excel file in a previous version of Excel. If it won't open, it is a virus.

It sounds like it could be a virus, but it could also be another problem, such as a corrupt file. You should try to open other files in Excel first.

Which of the following is NOT one of the basic functions of malware? 1. Gathering personal information about you 2. Launching a denial of service attack 3. Aggressive advertising ​4. Tracking your surfing habits

Launching a denial of service attack

How do logic bombs and worms work? 1. Logic bombs execute when a certain set of conditions is met and spread when infected files are passed from user to user, whereas worms infect a host file and wait for you to execute that file before they spread. 2. Logic bombs run independently of host file execution and are much more active in spreading themselves, whereas worms infect a host file and wait for you to execute that file before they spread. 3. Logic bombs execute when a certain set of conditions is met and are spread when infected files are passed from user to user, whereas worms run independently of host file execution and are much more active in spreading themselves. 4. Logic bombs replicate themselves to a hard drive's master boot record, whereas worms run independently of host file execution and are much more active in spreading themselves.

Logic bombs execute when a certain set of conditions is met and are spread when infected files are passed from user to user, whereas worms run independently of host file execution and are much more active in spreading themselves.

What are macro viruses and e-mail viruses? 1. Macro viruses are the opposite of micro viruses and attack only large data files, whereas e-mail viruses are attached to your e-mail and affect the e-mail contents. 2. Macro viruses run a program that searches for common types of data files and compresses them. E-mail viruses are enabled when the e-mail is opened. 3. Macro viruses are enabled when macros in the documents that they are attached to are run, whereas e-mail viruses are enabled when the e-mail is opened. 4. Macro viruses are attached to documents that contain macros, whereas e-mail viruses come as e-mail attachments.

Macro viruses are attached to documents that contain macros, whereas e-mail viruses come as e-mail attachments.

So, am I all set after I have the antivirus software up and running? 1. Yes. You are all set and can use your computer without fear of infection from viruses or worms. 2. Not really. You need to make sure you update your application software regularly. 3. Not really. You need to keep both your antivirus software and your system software up-to-date. 4. Not really. You need to update your application and system software.

Not really. You need to keep both your antivirus software and your system software up-to-date.

How can my computer catch a virus? 1. One way your computer can get a virus is when too many people use the same computer. 2. One way your computer can get a virus is by booting it with an unformatted DVD in the DVD drive. 3. One way your computer can get a virus is by booting it with an infected flash drive left in a USB port. 4. One way your computer can get a virus is by running antivirus programs.

One way your computer can get a virus is by booting it with an infected flash drive left in a USB port.

After deletion (in Windows), your files are stored in the __________. 1. Restore Point 2. Backup Zone ​3. Recycle Bin​ ​​4. Deleted Folder

Recycle Bin​

And what are scripts? 1. Scripts are programs or files you download off the web. Once executed, they perform their malicious duties in the background, often invisible to the user. 2. Scripts are programs that seem to be screensavers but actually perform other activities that can harm your computer in the background. 3. Scripts are mini programs that are executed without your knowledge when you enter a site. 4. Scripts are changes in its own code that avoid detection.

Scripts are mini programs that are executed without your knowledge when you enter a site.

Once I download or buy the firewall software, how do I get it installed and tested? 1. You need a software programmer to create a special drive to install the firewall and use the Error-Check utility. It will check for any errors in the firewall tests and you can proceed accordingly.​ 2. Some people prefer professional help, but most home users can install and test their firewall by following the instructions provided in the user manual. You can test it by going to such sites as grc.com and running the ShieldsUP test to see if you're safe. 3. Just call the local technician. Do not try to install it on your own. It will cause system problems. You can test it on your own though, because all firewalls come with testing software.​ 4. You can install the firewall on your own but testing requires a certified professional or you will have a hard drive crash.​

Some people prefer professional help, but most home users can install and test their firewall by following the instructions provided in the user manual. You can test it by going to such sites as grc.com and running the ShieldsUP test to see if you're safe.

The __________ utility allows you to create a copy of your entire hard drive on an external hard drive. 1. Backup and Restore 2. Scan Disk 3. Disk Copy ​4. System Image

System Image

What can I do to protect my computer? 1. The most important preventive measure you can take is to install antivirus software. 2. The most important preventive measure you can take is to install a firewall. 3. Just avoid visiting unknown websites that may launch malicious scripts on your computer. 4. The most important preventative measure you can take is to install packet filtering.

The most important preventive measure you can take is to install antivirus software.

Is it important to have a firewall on a home network? 1. If you're using a dial-up Internet connection, you don't need a firewall. 2. You need it only if you're going to buy things online with a credit card. If not, you can do without a firewall. 3. To be safe, you should always have a firewall if you plan to connect to the Internet. 4. Hackers don't bother home computers.

To be safe, you should always have a firewall if you plan to connect to the Internet.

If your system becomes unstable, you can reset it to a configuration from a past date by using __________. 1. Windows Scan Disk 2. Windows System Restore 3. Windows System Archive Wizard ​​4. Windows File History

Windows System Restore

Are there different kinds of firewalls? 1. The most effective firewalls are hardware devices designed to restrict access to your computer. 2. The most effective firewalls are software programs designed to restrict access to your computer. 3. The most effective firewall is the Norton Internet Security suite. 4.You can buy either a hardware firewall device or special firewall software designed to restrict access to your computer.

You can buy either a hardware firewall device or special firewall software designed to restrict access to your computer.

Updates that you can download to fix possible security issues are called software __________. 1. patches 2. repairs 3. bandages 4. reboots

patches


Set pelajaran terkait

Insurance licensing exam- Chapter 1

View Set

Chapter 10 Communicating Digital Content

View Set