WNSF-Safe Home Computing Course

Ace your homework & exams now with Quizwiz!

An access controls list (or ACL)

A. Defines who can perform actions on a file or folder

Viruses can reach your computer in which of the following ways? A. E-mails B. Passwords C. Downloaded files D. A and C only E. All of the Above

D. A and C only

Which of the following defines a strong password?

D. All of the Above

High-speed connections (cable and DSL) are the only two connections intruders attack

False

When you send email, browse a web site, or chat online with someone, the conversation between you and that person goes directly from your computer to his or her computer

False

Worms are usually cleverly disguised so that they blend in with other programs running on your computer

False

ARPAnet was the precursor to today's internet

True

The firewall determines if network traffic should continue on to its destination or be stopped

True

Whenever you download a file from the Internet, check it for viruses before using it

True

Which of the following are common intruder practices? a. Spoofing b. Hoaxing c. Sniffing d. A and C only e. none of the above

d. A and C only


Related study sets

Chemical Reactions 5 - Acids and Bases

View Set

Observing God's World Ch 1: Plentiful Plants

View Set

Los pasatiempos y el ocio de perú

View Set

GENETICS FINAL!!!! BIO 2300 Pt. 2

View Set

Chapter 3 Quiz Political Science

View Set