WNSF-Safe Home Computing Course
An access controls list (or ACL)
A. Defines who can perform actions on a file or folder
Viruses can reach your computer in which of the following ways? A. E-mails B. Passwords C. Downloaded files D. A and C only E. All of the Above
D. A and C only
Which of the following defines a strong password?
D. All of the Above
High-speed connections (cable and DSL) are the only two connections intruders attack
False
When you send email, browse a web site, or chat online with someone, the conversation between you and that person goes directly from your computer to his or her computer
False
Worms are usually cleverly disguised so that they blend in with other programs running on your computer
False
ARPAnet was the precursor to today's internet
True
The firewall determines if network traffic should continue on to its destination or be stopped
True
Whenever you download a file from the Internet, check it for viruses before using it
True
Which of the following are common intruder practices? a. Spoofing b. Hoaxing c. Sniffing d. A and C only e. none of the above
d. A and C only