Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Computer Concepts Study Set 1
Quiz 5: Data Security
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 41
Multiple Choice
A good ____ can be used to scan the Web to assemble data for search engines.
Question 42
Multiple Choice
____ is the practice of intercepting signals with a Wi-Fi enabled notebook.
Question 43
Multiple Choice
Kyle is training a new employee named Mira on how to set up measures to protect the computers and systems in their company. Kyle tells his co-worker Mira that ____ is the most secure password for her to choose.
Question 44
Multiple Choice
The application in the accompanying figure is an example of a program that protects against ____.
Question 45
Multiple Choice
Kyle is training a new employee named Mira on how to set up measures to protect the computers and systems in their company. Kyle tells his co-worker Mira that which of the following is NOT true about cookies?
Question 46
Multiple Choice
Jordanna recently lost a lot of data when a virus attacked her computer system. She is coming up with a backup plan to minimize future data loss. Jordanna knows that a ____ is a bootable disk that contains a complete copy of your computer's hard drive as it existed when shipped from the manufacturer.
Question 47
Multiple Choice
____ is an email or IM-based scam designed to persuade you to reveal confidential information.
Question 48
Multiple Choice
The application shown in the accompanying figure is an example of a(n) ____.
Question 49
Multiple Choice
Internet service providers use e-mail ____ techniques to verify that e-mail messages originate from the Internet domain from which they claim to have been sent.
Question 50
Multiple Choice
A(n) ____ is software or hardware designed to filter out suspicious data attempting to enter or leave a computer.
Question 51
Multiple Choice
____ can encrypt data based on the user's password and implements message integrity checking.
Question 52
Multiple Choice
A ____ attack is when hackers intercept information sent out over networks.
Question 53
Multiple Choice
Kyle is training a new employee named Mira on how to set up measures to protect the computers and systems in their company. Kyle tells his co-worker Mira that to avoid malware, she should avoid all of the following EXCEPT ____.