Deck 5: Protecting Your Computer

Full screen (f)
exit full mode
Question
Most antivirus programs inoculate suspicious files in a safely segregated location so you can choose to restore or delete them. _________________________
Use Space or
up arrow
down arrow
to flip the card.
Question
Spyware can change system settings, interrupt programs, and slow your computer's performance. _________________________
Question
If you want to keep information about your Web browsing private, you can use InPrivate Browsing.
Question
People who create and send malware are called ____.

A)hacks
B)white hats
C)hackers
D)spammers
Question
Pharming is an attempt to deceive you into revealing personal or financial information when you respond to an email message and visit a Web site. _________________________
Question
A(n)pop-up ad is a small Web window that appears when you visit a Web site, and that advertises a product or service. _________________________
Question
You may need to use more than one antivirus program in order to find and eliminate all viruses on your computer.
Question
Windows Defender helps prevent malware from installing itself and running on your computer. _________________________
Question
Windows Airlock is software that serves as a barrier between your computer and a network or the Internet.
Question
A voucher is a digital document that verifies the security of a Web site you visit.
Question
A(n)roadblock defends against malware trying to gain access to your computer by monitoring your network and Internet connection. _________________________
Question
Email hurdling is the practice of using vulnerabilities in your computer to send spam to other computers without your permission. _________________________
Question
A strong password contains at least six characters and should include numbers and symbols.
Question
Another term for junk email is salami.
Question
An update is a change to software that can prevent or repair problems, enhance the security of a computer, or improve a computer's performance.
Question
A Trojan horse is malware that hides inside another program.
Question
The computer is vulnerable at the point of booting because antivirus software hasn't started yet.
Question
____ is another term for harmful software, including viruses.

A)Malware
B)Vaporware
C)Shareware
D)Infectionware
Question
Black hat hackers are also known as crackers . _________________________
Question
Secure Boot can detect when a file has interfered with the operating system and prevent that file from loading. _________________________
Question
Windows Defender ____ files that might be spyware.

A)inoculates
B)eradicates
C)quarantines
D)cross-references with your antivirus program about
Question
Antivirus software works by comparing files on your computer against a ____.

A)malware table
B)virus definition list
C)master hacker chart
D)list of cookies on your computer
Question
Microsoft Edge's ____ feature helps prevent Web site content providers from collecting information about sites you visit.

A)Incognito
B)Tracking Protection
C)InPrivate filtering
D)Secure connections
Question
____ are windows that appear while you are viewing a Web page and advertise a product or service.

A)Pop-up ads
B)Spamware notices
C)Pings
D)Cookies
Question
A ____ is malware that hides inside another program, such as a photo-viewing program that you download from the Web.

A)virus
B)worm
C)snake
D)Trojan horse
Question
____ updates usually enhance your computing experience and repair problems that are not considered critical.

A)Vital
B)Important
C)Optional
D)Recommended
Question
____ can install itself on your computer without your knowledge or consent, and monitors your computing activities to collect information about you.

A)A virus
B)Shareware
C)Spyware
D)Vaporware
Question
A service pack is a(n)____.

A)antivirus utility
B)collection of Microsoft updates
C)Web extension provided by Windows Defender
D)CD that restores an infected computer's original settings
Question
You need to keep ____ in Windows Defender up to date.

A)malware definitions
B)spyware notations
C)Web links
D)URL keys
Question
When Windows Defender detects suspicious software, it displays a dialog box where you can choose the ____ option, for example.

A)Index
B)Filter
C)Remove
D)Monitor
Question
Windows comes equipped with antispyware software called ____.

A)Windows Update
B)Windows Firewall
C)Windows Defender
D)InPrivate Filtering
Question
In the Customize Settings window for Windows Firewall, which of the following can you specify?

A)Reinstall Windows Firewall
B)Monitor all incoming connections
C)Set Windows Firewall to Medium Security
D)Notify me when Windows Firewall blocks a new app
Question
Which of the following is a Microsoft Edge security feature?

A)SmartScreen Filter
B)Analog signatures
C)InPrivate Manager
D)Spyware filter
Question
Your best protection against malware is to use the current version of ____.

A)Windows Rootkit
B)your antivirus software
C)Windows Update
D)Microsoft Edge's phishing filter
Question
A ____ is harmful computer code that spreads without your interaction, slipping from one network to another and replicating itself on network computers.

A)snake
B)virus
C)worm
D)Trojan horse
Question
Spammers may use your computer to send spam to other computers without your permission, a practice known as ____.

A)cracking
B)pharming
C)an email relay
D)email dredging
Question
____ is an attempt to deceive you into revealing personal or financial information when you respond to an email message or visit a Web site.

A)Datamining
B)Probing
C)Spamming
D)Phishing
Question
Windows Firewall protects your computer by ____.

A)scanning email for viruses
B)preventing acts of phishing
C)detecting viruses downloaded from the Web
D)preventing unauthorized users from accessing your computer
Question
____ is software that acts as a barrier between your computer and a network or the Internet.

A)Windows Defender
B)The Action Center
C)Windows Airlock
D)Windows Firewall
Question
Viruses and other security threats are often contained in email attachments, especially files with filename extensions such as ____.

A).exe
B).j p g
C).tiff
D).docx
Question
A browser ____ is a program offered by any software vendor that provides enhancements such as a toolbar or an improved search feature.

A)widget
B)add-on
C)script
D)applet
Question
A(n)____ is programming code that performs a series of commands and can be embedded in a Web page.

A)script
B)minicode
C)digital signature
D)background process
Question
UAC stands for ____.

A)User Account Control
B)User Access Control
C)Utility Account Card
D)Usability Access Coordinator
Question
____________________ is turned on by default, so it doesn't allow communications with most programs via the Internet or a network.
Question
If attackers access your system through a Trojan horse, they might install a(n)____________________, which is malware that gains administrator-level, or root-level, access to a computer or network without the system or users detecting its presence.
Question
You can delete cookies by clearing your Web page ____.

A)backup
B)Favorites list
C)filter
D)history
Question
When you visit a Web site with pop-up windows and the Pop-up Blocker is turned on, the ____ opens to display a message informing you that it blocked a pop-up window.

A)Status bar
B)Internet Options dialog box
C)IE toolbox
D)Notification bar
Question
A(n)____ is a small file that records information about you, such as the type of browser you are using, your email address, and your preferences for using a Web site.

A)cookie
B)biscuit
C)Web bug
D)add-on
Question
Sometimes pop-up ads may ____, or seize control of, your browser.

A)hoodwink
B)lasso
C)hijack
D)lock out
Question
A Windows ____ is a collection of information that indicates the files and folders you can access, the types of changes you can make to the computer, and your preferred appearance settings.

A)profile
B)user account
C)Live ID
D)master directory
Question
A Windows ____ account is primarily for people who need temporary access to a computer, and it is not used often.

A)Guest
B)Day-pass
C)Temporary
D)Administrator
Question
____-party cookies are generated from Web site advertisers, who might use them to track your Web use for marketing purposes.

A)First
B)Second
C)Third
D)Fourth
Question
A(n)____ is a digital document that verifies the security of a Web site you visit.

A)Web Watermark
B)digital signature
C)certificate
D)authorization
Question
When you use ____________________, Windows periodically checks for changes to the operating system from Microsoft.
Question
If you want to keep information about your Web browsing private, you can use Microsoft Edge's ____ feature.

A)ShieldsUp!
B)Firewall filter
C)Incognito
D)InPrivate Browsing
Question
A(n)____ password contains at least eight characters, is composed of words not found in a dictionary, and contains lowercase and uppercase letters, numbers, and symbols.

A)rigid
B)strong
C)invulnerable
D)unbreakable
Question
____ are electronic security marks that can be added to files. They identify the publisher of a file and verify that the file has not had its integrity compromised.

A)Data readers
B)Digital watermarks
C)Digital signatures
D)Web certificates
Question
Web ____ are transparent images that invisibly track Web site usage.

A)panes
B)spiders
C)beacons
D)cookies
Question
A(n)____ Web site is a fraudulent site posing as a legitimate one.

A)shadow
B)mirrored
C)spoofed
D)extranet
Question
____________________ monitors your computing actions, usually while you are online, to collect information about you.
Question
A quarantine is a  transparent image that invisibly tracks Web site usage ​
Question
____________________ cookies are generated from the Web sites you visit and contain information the Web sites reuse when you return.
Question
Microsoft Edge 's ____________________ feature prevents Microsoft Edge from storing data about your browsing session.
Question
Name and describe the security features in Windows 10.
Question
Name and describe the  Microsoft Edge  security features listed in the chapter.
Question
A script s a p rogramming code that performs a series of commands and can be embedded in a Web page ​.
Question
A(n)____________________ Web site is a fraudulent site posing as a legitimate one.
Question
____________________ is an attempt to deceive you into revealing personal or financial information when you respond to an email message or visit a Web site.
Question
____________________ can detect when a file has interfered with the operating system and prevent that file from loading so it doesn't interfere with the operating system again.
Question
A web beacon is a  Windows Defender action to isolate potential spyware ​.
Question
____________________ a computer means you verify that you have an account on that computer.
Question
____________________ controls are small, self-contained programs downloaded from a Web page to your computer. They are often used to make it easier to perform tasks, but sometimes are used by hackers to distribute adware and spyware.
Question
Windows ____________________ periodically scans your computer to detect and remove spyware.
Question
____________________ analyzes the content of Web pages you visit. If it finds content that is used on other Web sites, it blocks the content from Web sites that appear on its lists.
Question
Name and describe the five methods listed in the chapter for defending against viruses so that they do not infect your computer.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/75
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 5: Protecting Your Computer
1
Most antivirus programs inoculate suspicious files in a safely segregated location so you can choose to restore or delete them. _________________________
False
2
Spyware can change system settings, interrupt programs, and slow your computer's performance. _________________________
True
3
If you want to keep information about your Web browsing private, you can use InPrivate Browsing.
True
4
People who create and send malware are called ____.

A)hacks
B)white hats
C)hackers
D)spammers
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
5
Pharming is an attempt to deceive you into revealing personal or financial information when you respond to an email message and visit a Web site. _________________________
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
6
A(n)pop-up ad is a small Web window that appears when you visit a Web site, and that advertises a product or service. _________________________
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
7
You may need to use more than one antivirus program in order to find and eliminate all viruses on your computer.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
8
Windows Defender helps prevent malware from installing itself and running on your computer. _________________________
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
9
Windows Airlock is software that serves as a barrier between your computer and a network or the Internet.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
10
A voucher is a digital document that verifies the security of a Web site you visit.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
11
A(n)roadblock defends against malware trying to gain access to your computer by monitoring your network and Internet connection. _________________________
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
12
Email hurdling is the practice of using vulnerabilities in your computer to send spam to other computers without your permission. _________________________
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
13
A strong password contains at least six characters and should include numbers and symbols.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
14
Another term for junk email is salami.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
15
An update is a change to software that can prevent or repair problems, enhance the security of a computer, or improve a computer's performance.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
16
A Trojan horse is malware that hides inside another program.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
17
The computer is vulnerable at the point of booting because antivirus software hasn't started yet.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
18
____ is another term for harmful software, including viruses.

A)Malware
B)Vaporware
C)Shareware
D)Infectionware
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
19
Black hat hackers are also known as crackers . _________________________
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
20
Secure Boot can detect when a file has interfered with the operating system and prevent that file from loading. _________________________
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
21
Windows Defender ____ files that might be spyware.

A)inoculates
B)eradicates
C)quarantines
D)cross-references with your antivirus program about
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
22
Antivirus software works by comparing files on your computer against a ____.

A)malware table
B)virus definition list
C)master hacker chart
D)list of cookies on your computer
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
23
Microsoft Edge's ____ feature helps prevent Web site content providers from collecting information about sites you visit.

A)Incognito
B)Tracking Protection
C)InPrivate filtering
D)Secure connections
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
24
____ are windows that appear while you are viewing a Web page and advertise a product or service.

A)Pop-up ads
B)Spamware notices
C)Pings
D)Cookies
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
25
A ____ is malware that hides inside another program, such as a photo-viewing program that you download from the Web.

A)virus
B)worm
C)snake
D)Trojan horse
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
26
____ updates usually enhance your computing experience and repair problems that are not considered critical.

A)Vital
B)Important
C)Optional
D)Recommended
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
27
____ can install itself on your computer without your knowledge or consent, and monitors your computing activities to collect information about you.

A)A virus
B)Shareware
C)Spyware
D)Vaporware
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
28
A service pack is a(n)____.

A)antivirus utility
B)collection of Microsoft updates
C)Web extension provided by Windows Defender
D)CD that restores an infected computer's original settings
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
29
You need to keep ____ in Windows Defender up to date.

A)malware definitions
B)spyware notations
C)Web links
D)URL keys
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
30
When Windows Defender detects suspicious software, it displays a dialog box where you can choose the ____ option, for example.

A)Index
B)Filter
C)Remove
D)Monitor
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
31
Windows comes equipped with antispyware software called ____.

A)Windows Update
B)Windows Firewall
C)Windows Defender
D)InPrivate Filtering
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
32
In the Customize Settings window for Windows Firewall, which of the following can you specify?

A)Reinstall Windows Firewall
B)Monitor all incoming connections
C)Set Windows Firewall to Medium Security
D)Notify me when Windows Firewall blocks a new app
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
33
Which of the following is a Microsoft Edge security feature?

A)SmartScreen Filter
B)Analog signatures
C)InPrivate Manager
D)Spyware filter
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
34
Your best protection against malware is to use the current version of ____.

A)Windows Rootkit
B)your antivirus software
C)Windows Update
D)Microsoft Edge's phishing filter
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
35
A ____ is harmful computer code that spreads without your interaction, slipping from one network to another and replicating itself on network computers.

A)snake
B)virus
C)worm
D)Trojan horse
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
36
Spammers may use your computer to send spam to other computers without your permission, a practice known as ____.

A)cracking
B)pharming
C)an email relay
D)email dredging
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
37
____ is an attempt to deceive you into revealing personal or financial information when you respond to an email message or visit a Web site.

A)Datamining
B)Probing
C)Spamming
D)Phishing
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
38
Windows Firewall protects your computer by ____.

A)scanning email for viruses
B)preventing acts of phishing
C)detecting viruses downloaded from the Web
D)preventing unauthorized users from accessing your computer
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
39
____ is software that acts as a barrier between your computer and a network or the Internet.

A)Windows Defender
B)The Action Center
C)Windows Airlock
D)Windows Firewall
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
40
Viruses and other security threats are often contained in email attachments, especially files with filename extensions such as ____.

A).exe
B).j p g
C).tiff
D).docx
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
41
A browser ____ is a program offered by any software vendor that provides enhancements such as a toolbar or an improved search feature.

A)widget
B)add-on
C)script
D)applet
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
42
A(n)____ is programming code that performs a series of commands and can be embedded in a Web page.

A)script
B)minicode
C)digital signature
D)background process
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
43
UAC stands for ____.

A)User Account Control
B)User Access Control
C)Utility Account Card
D)Usability Access Coordinator
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
44
____________________ is turned on by default, so it doesn't allow communications with most programs via the Internet or a network.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
45
If attackers access your system through a Trojan horse, they might install a(n)____________________, which is malware that gains administrator-level, or root-level, access to a computer or network without the system or users detecting its presence.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
46
You can delete cookies by clearing your Web page ____.

A)backup
B)Favorites list
C)filter
D)history
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
47
When you visit a Web site with pop-up windows and the Pop-up Blocker is turned on, the ____ opens to display a message informing you that it blocked a pop-up window.

A)Status bar
B)Internet Options dialog box
C)IE toolbox
D)Notification bar
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
48
A(n)____ is a small file that records information about you, such as the type of browser you are using, your email address, and your preferences for using a Web site.

A)cookie
B)biscuit
C)Web bug
D)add-on
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
49
Sometimes pop-up ads may ____, or seize control of, your browser.

A)hoodwink
B)lasso
C)hijack
D)lock out
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
50
A Windows ____ is a collection of information that indicates the files and folders you can access, the types of changes you can make to the computer, and your preferred appearance settings.

A)profile
B)user account
C)Live ID
D)master directory
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
51
A Windows ____ account is primarily for people who need temporary access to a computer, and it is not used often.

A)Guest
B)Day-pass
C)Temporary
D)Administrator
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
52
____-party cookies are generated from Web site advertisers, who might use them to track your Web use for marketing purposes.

A)First
B)Second
C)Third
D)Fourth
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
53
A(n)____ is a digital document that verifies the security of a Web site you visit.

A)Web Watermark
B)digital signature
C)certificate
D)authorization
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
54
When you use ____________________, Windows periodically checks for changes to the operating system from Microsoft.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
55
If you want to keep information about your Web browsing private, you can use Microsoft Edge's ____ feature.

A)ShieldsUp!
B)Firewall filter
C)Incognito
D)InPrivate Browsing
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
56
A(n)____ password contains at least eight characters, is composed of words not found in a dictionary, and contains lowercase and uppercase letters, numbers, and symbols.

A)rigid
B)strong
C)invulnerable
D)unbreakable
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
57
____ are electronic security marks that can be added to files. They identify the publisher of a file and verify that the file has not had its integrity compromised.

A)Data readers
B)Digital watermarks
C)Digital signatures
D)Web certificates
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
58
Web ____ are transparent images that invisibly track Web site usage.

A)panes
B)spiders
C)beacons
D)cookies
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
59
A(n)____ Web site is a fraudulent site posing as a legitimate one.

A)shadow
B)mirrored
C)spoofed
D)extranet
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
60
____________________ monitors your computing actions, usually while you are online, to collect information about you.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
61
A quarantine is a  transparent image that invisibly tracks Web site usage ​
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
62
____________________ cookies are generated from the Web sites you visit and contain information the Web sites reuse when you return.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
63
Microsoft Edge 's ____________________ feature prevents Microsoft Edge from storing data about your browsing session.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
64
Name and describe the security features in Windows 10.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
65
Name and describe the  Microsoft Edge  security features listed in the chapter.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
66
A script s a p rogramming code that performs a series of commands and can be embedded in a Web page ​.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
67
A(n)____________________ Web site is a fraudulent site posing as a legitimate one.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
68
____________________ is an attempt to deceive you into revealing personal or financial information when you respond to an email message or visit a Web site.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
69
____________________ can detect when a file has interfered with the operating system and prevent that file from loading so it doesn't interfere with the operating system again.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
70
A web beacon is a  Windows Defender action to isolate potential spyware ​.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
71
____________________ a computer means you verify that you have an account on that computer.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
72
____________________ controls are small, self-contained programs downloaded from a Web page to your computer. They are often used to make it easier to perform tasks, but sometimes are used by hackers to distribute adware and spyware.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
73
Windows ____________________ periodically scans your computer to detect and remove spyware.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
74
____________________ analyzes the content of Web pages you visit. If it finds content that is used on other Web sites, it blocks the content from Web sites that appear on its lists.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
75
Name and describe the five methods listed in the chapter for defending against viruses so that they do not infect your computer.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 75 flashcards in this deck.