Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Practical Computer Literacy Study Set 1
Quiz 22: Computer Benefits and Risks
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Multiple Choice
A Trojan horse might allow a hacker to _____.
Question 22
Multiple Choice
The process of eradicating a virus, sometimes called _____, might include deleting the virus code from files or deleting infected files.
Question 23
Multiple Choice
Typically, infected attachments look like _____ files, and they infect your computer when you open them.
Question 24
Multiple Choice
_____ IP addresses is the only one that can be accessed directly from the Internet.
Question 25
Multiple Choice
Which of the following is the opposite of a gateway?
Question 26
Multiple Choice
You should configure _____ to set Windows to display file extensions.
Question 27
Multiple Choice
A key characteristic of viruses is their ability _____.
Question 28
Multiple Choice
Which of the following files is most likely to contain a hidden virus?
Question 29
Multiple Choice
The original wireless encryption was called _____ because it was designed to provide a level of confidentiality similar to that of a wired network.
Question 30
Multiple Choice
If _____, Windows firewall should be on.
Question 31
Multiple Choice
A _____ is malicious software designed to spread from computer to computer over local area networks and the Internet.
Question 32
Multiple Choice
The most prevalent types of malicious code include all of the following, EXCEPT _____.
Question 33
Multiple Choice
The data carried by Wi-Fi signals can be encrypted with all of the following, EXCEPT _____.
Question 34
Multiple Choice
Some Trojan horses contain a virus or a worm, which can replicate and spread. Virus experts call this a(n) _____ threat because it combines more than one type of malicious code.
Question 35
Multiple Choice
A _____ attack is designed to generate a lot of activity on a network by flooding it with useless traffic-enough traffic to overwhelm the network's processing capability and essentially bring all communications to a halt.