Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Computer Concepts
Quiz 5: Data Security
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 41
Multiple Choice
A virus ____ is a section of program code that can be used to identify a known malicious program.
Question 42
Multiple Choice
The application in the accompanying figure is an example of a program that protects against ____.
Question 43
Multiple Choice
Jordanna recently lost a lot of data when a virus attacked her computer system. She is coming up with a backup plan to minimize future data loss. Jordanna uses her Windows installation CD as a ____, because it contains the operating system files needed to boot her computer without accessing the hard drive.
Question 44
Multiple Choice
A(n) ____ is software or hardware designed to filter out suspicious data attempting to enter or leave a computer.
Question 45
Multiple Choice
Internet service providers use e-mail ____ techniques to verify that e-mail messages originate from the Internet domain from which they claim to have been sent.
Question 46
Multiple Choice
A ____ is the basis for encrypting and decrypting the data transmitted between wireless devices.
Question 47
Multiple Choice
A(n) ____ contains your computer settings and is used if you experience a hard drive problem.
Question 48
Multiple Choice
Kyle is training a new employee named Mira on how to set up measures to protect the computers and systems in their company. Kyle tells his co-worker Mira that ____ is the most secure password for her to choose.
Question 49
Multiple Choice
A good ____ can be used to scan the Web to assemble data for search engines.
Question 50
Multiple Choice
The application shown in the accompanying figure is an example of a(n) ____.
Question 51
Multiple Choice
The information that antivirus software uses to identify and remove malware is referred to as a virus ____.
Question 52
Multiple Choice
A ____ attack is when hackers intercept information sent out over networks.
Question 53
Multiple Choice
Port scanning software can examine more than ____ computers per minute.
Question 54
Multiple Choice
Kyle is training a new employee named Mira on how to set up measures to protect the computers and systems in their company. Kyle tells his co-worker Mira that to avoid malware, she should avoid all of the following EXCEPT ____.