Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Guide to PCs
Quiz 15: Computer and Network Security
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
True/False
Active scripts are used so that web pages stay static and do not change except for the data entered into textboxes or customer-driven scripts.
Question 22
True/False
PGP or S/MIME is used to protect email.
Question 23
True/False
When WEP is configured on the access point, all wireless clients must use WEP.
Question 24
True/False
A new file is created and stored in an encrypted folder. The file must be manually encrypted because it was added after the folder was encrypted.
Question 25
True/False
An email that comes from what appears to be your own bank, but actually is not, is an example of spyware.
Question 26
True/False
SSID broadcasting is when an access point sends out its WEP key to all wireless clients through the air. Those clients attached to the access point are allowed to transmit data.
Question 27
True/False
WEP is a type of wireless authentication technique.
Question 28
True/False
40-bit WEP and 64-bit WEP are the same thing.
Question 29
True/False
Phishing is controlled by using S/MIME.
Question 30
True/False
Mobile devices do not need antivirus software.
Question 31
True/False
A firewall cannot protect a wireless network.
Question 32
True/False
Grayware is a generic term for application or files that affect the computerʹs performance and cause it to act unusual.
Question 33
True/False
When you have a personal incident of child exploitation, you should report it to the FBI.
Question 34
True/False
Adware would show up as one or more pop-ups on a computer.
Question 35
True/False
A SPAN is a special type of security network.
Question 36
True/False
When you have a personal incident of phishing, you should report it to the FBI.
Question 37
True/False
A program that you have never used is trying to access your computer and the Windows firewall notices it. An alert comes up, and you use the Keep Blocking This Program option so that the program is effectively blocked.