SAU Computer Concepts Test 6, SAU Computer Concepts Test 7

Ace your homework & exams now with Quizwiz!

_______ can be used to flood a Web site with so much traffic that it can no longer provide its intended service.

All of the above

A "memory leak" means

An application has acquired memory for its use, but failed to return it to the available pool when done.

_____________ software shields certain applications against behaviors commonly exhibited by intrusions.

Antivirus ???

Two of the most common open source and free software licenses are ___________.

BSD (Berkeley Software Distribution) and GPL (General Public License)

Which of the following is a file management utility?

Both A and B

Which of the following would be considered essential software for both laptop computers and tablet computers?

Browser

Which of the following attacks uses password-cracking software to generate every possible combination of letters, numerals, and symbols?

Brute force

While data is being collected for sending out to a device such as a printer or screen, it is temporarily placed in a

Buffer ?

__________ is the process of modifying an executable file or data stream by adding additional commands.

Code injection

When antivirus software detects malware, which of the following would not be a course of action you could take?

Conduct a heuristic analysis.

When you empty the trash on your computer what happens?

Data in the sectors where deleted files were stored is removed. ??

Which category of software would programming languages fall into?

Development Software

Which of the following is not a characteristic of a weak password?

Eight characters in length and include one or more uppercase letters, numbers, and symbols

This type of security transforms a message or data file in such a way that its contents are hidden from unauthorized readers.

Encryption

Which of the following is not a type of spam filter?

Entropy ???

To establish a(n) ________, hackers set up an unsecured Wi-Fi hotspot complete with an Internet connection.

Evil Twin

The action carried out by malware code is referred to as:

Exploit

Where do you look for the option which encrypts a file as you save it from Microsoft Word?

File menu ???

When using iOS, if you have too many app icons on the screen and wish to group them in folders

Hold an app icon down to get the OS into "jiggle" mode, then drag one icon on top of another to group them.

A disadvantage of a Web app is:

If the app server goes down or is terminated, you cannot use the app.

In order to maintain safe computing, Mac users should

Install updates for the OS as they come available, use encrypted connections, don't open suspicious email attachments, and don't click on links in email messages.

Which of the following is true?

Laptops and desktops are used to create as well as consume content, while portable devices are used primarily to consume content ??

Which operating system is open source and available as distros, such as Ubuntu and Mint?

Linux

In order to defend your password from a brute-force attack:

Make it longer ???

Which of the following sequence of events best describes an online intrusion?

Malware enters the device, and then opens a backdoor, which opens a communications link on the device that a hacker can exploit.

Which OS is installed on more than 80% of the world's personal computers?

Microsoft Windows

Which of the following is part of the process for installing software on a PC?

None of the above

____________ is a term for a person who devises and carries out a scam in order to accomplish a goal.

None of the above

According to the definition in our textbook and the design of iOS, the primary item you'll see in a laptop or desktop operating system that is absent from cell phones and tablets is

Office Suite ??

Which type of software must include the source code, which allows programmers to modify and improve the software?

Open source

What is the term used to describe unwanted software that installs along with the application software that you originally downloaded and installed?

PUP

__________ software may be freely copied, distributed, and even resold.

Public domain

A(n) ___________ is malware that arrives in a trojan disguised as legitimate software and sets up a secret communication link to a hacker.

RAT

If malware hides its existence on your computer, that technique is referred to as a:

Rootkit ???

Word processing software is likely to include which of the following features?

Search and Replace, readability formula

What is the process called when an app from a source other than an official app store is installed on a device?

Side-loading

____________ is a service offered by Google that checks URLs against a list of suspicious Web site URLs.

SmartScreen Filter

Trojans depend on ________ to spread.

Social engineering

______________ is a deceptive practice that exploits human psychology by inducing victims to interact with a digital device in a way that is not in their best interest.

Social engineering

Which of the following is not a file-naming convention?

Spaces are not allowed

_____________ exploits send deceptive messages to targeted individuals in an attempt to get those individuals to click links to infected Websites.

Spear phishing

Which of the following is not a characteristic of a computer worm?

Spread through a process called side-loading

What are the main software categories?

System, Development, and Application

The current method of encrypting communication between a client and a server depends on a security protocol called _______.

TLS

If you use a password manager, what do you as the user need to remember?

The Master Password

______________________ increases security by verifying identity based on more than just a password or PIN.

Two-factor authentication

Which of the following would not be considered an operating system resource?

URL (Uniform Resource Locator)

Which of the following is not an example of user authentication?

URLs (Uniform Resource Locators) ???

A strong aspect of Linux is:

abundance of tools it provides for customization.

A social engineering scam called ___________ is when a victim is promised a large sum of money in exchange for the temporary use of a bank account.

advance fee fraud

The best defense against malware is _____________.

antivirus software

Proprietary software has restrictions on it that

are delineated by copyright, patents, or license agreements.

The difference between a web app and a mobile app is that the program code for Web apps _________, whereas mobile apps are stored on the handheld device, so they have to be ___________.

arrives only when you use the app, downloaded and installed

In spreadsheet software, the________________ feature ensures that the results in every cell are accurate for the information currently entered in the worksheet.

automatic recalculation

The software application associated with a specific file type is called a(n) __________ application.

default

Which one of the following types of operating systems would most likely be found on a laptop computer?

desktop operating system

Operating systems provide file organization tools called ___________.

file management utilities

When saving a file, you must provide a valid file name that adheres to specific rules, referred to as _______________.

file-naming conventions

A(n) __________ is a device or software that is designed to block unauthorized access while allowing authorized communications.

firewall

In a spreadsheet worksheet, a(n) ___________ works behind the scenes to tell the microprocessor how to use the contents of cells in calculations.

formula

In order to use a Web app, you need to

go to the Web site.

Antivirus software can use techniques called__________ to detect malware by analyzing the characteristics and behavior of suspicious files.

heuristic analysis

A virus __________ usually arrives as an email message that contains warnings about a fake virus.

hoax

When is encryption done to the contents of a portable device using iOS or Android?

iOS: When you set a password to lock it Android: As a step separate from setting a password

The iOS operating system is found on which device?

iPhone

The primary reason cited in the textbook for Windows' reputation for being vulnerability to malware is

its huge user base, making it the largest target for malware creators.

A cryptographic __________ is a procedure for encryption or decryption.

key

Which of the following operating systems is found on Macintosh desktop and laptop computers?

macOS

A ___________ app is designed for a handheld device, such as a smartphone, tablet computer, or enhanced media player.

mobile

An operating system's ____________ capability supports a division of labor among all the processing units.

multiprocessing

If you suspect that your computer might be infected by a zero-day exploit, launching a(n) _______________ with a product such as Malwarebytes might identify the infection.

on-demand scan

A(n) ________________ takes place when an unauthorized person gains access to a digital device by using an Internet connection and exploiting vulnerabilities in hardware or software.

online intrusion

If you feel more secure with a totally random and unique password for each of your logins, then a(n) _______________ is an excellent option.

password manager

A(n) __________ pings a packet of data to a port in order to see if that port is open or not.

port scan

Activities called ___________ involve the microprocessor receiving commands as software carries out tasks and while input arrives from the keyboard, mouse, and other devices.

processes

The kernel of an operating system

remains in RAM the entire time your computer is on.

Which of the following features is unique to macOS?

resource fork

A ______________ exploit usually begins with a virus warning and an offer to disinfect the infected device.

rogue antivirus

The main directory on a storage device is referred to as the ________ directory.

root

If your Android device is set up by your wireless provider to get software from only one source, the process for removing this limitation is termed

rooting

Software for PCs contains a(n) _________ program that guides you through the installation process.

setup

A(n) ____________ is generally priced at a flat rate and allows software to be used on all computers at a specific location.

site license

Chrome OS is an example of a(n) _________ because it depends substantially on processing and storage provided by cloud-based servers.

thin client

Magnetic and optical media are divided into circular ______ and then further divided into pie-shaped ________.

tracks, sectors

A new version or edition of a software product is referred to as a software ___________.

upgrade

A computer _________ is a set of self-replicating program instructions that surreptitiously attaches itself to a legitimate executable file on a host device.

virus

A feature called ___________ determines how your text flows from line to line by automatically moving words down to the next line as you reach the right margin.

word wrap

A(n) ______________ attack exploits previously unknown vulnerabilities in software applications, hardware, and operating system program code.

zero-day

In order to install apps not authorized by Apple on your iOS device, you must

"jailbreak" it

Which of the following file extensions would you expect to find on a file containing an Excel spreadsheet?

.xlsx

Spam accounts for approximately ______ of all email.

70%

What is the only effective defense against a previously-unknown ransomware attack?

A backup unavailable to the malware ???

Which of the following would be considered spyware?

A keylogger

A virus signature is:

A series of instructions known to be part of a malware exploit

There are various encryption methods, but __________ is the encryption standard currently used worldwide.

AES (Advanced Encryption Standard)

__________ changes an originating address or a destination address to redirect the flow of data between two parties.

Address spoofing

Which of the following would be classified as productivity software?

All of the Above

A password manager can store passwords in an encrypted file located at which of the following storage locations?

All of the above

MITM (man-in-the-middle) attacks include which of the following?

All of the above

Which of the following can be used to block unauthorized access while allowing authorized communications on a device or network?

All of the above


Related study sets

medsurg eye and ear chapter 20, 21

View Set

Biochemistry Chapter 3 (Amino Acids, Peptides, and Proteins)

View Set

NUR 3010: CH 44 DIGESTIVE AND GASTROINTESTINAL TREATMENT MODALITIES

View Set

Managerial Accounting & Cost Concepts Ch. 1

View Set

Physics 1114- Multiple Choice Questions

View Set

PROF PRAC - UAP-IAPOA DOC 210 - M0C

View Set