Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Physic
Q:
A(n) ____________________ center is a specialized facility that houses and protects computer systems and information.
Q:
A(n) ____________________ disc is a CD or DVD that contains the operating system files needed to start your computer without accessing the hard disk.
Q:
A(n) ____________________ backup makes a copy of every file in the folders on your computer.
Q:
A(n) virus ____________________ is an e-mail with drastic instructions to take to protect yourself against a virus threat.
Q:
A(n) ____________________ virus removes its signature and conceals itself in memory.
Q:
A(n) ____________________ is the calculation of the binary values of the bytes in a file.
Q:
____________________ is malicious code that encrypts documents and other files and demands payment for the encryption key.
Q:
A network of bot-infested computers is called a(n) ____________________.
Q:
A(n) ____________________ can be used to search the Web to assemble data for search engines or monitor chat groups for offensive language.
Q:
Any software that can autonomously execute a task when commanded to do so is called a(n) ____________________ agent.
Q:
A(n) ____________________ threat is a term where more than one type of malicious program is used to disrupt a computer system.
Q:
A(n) ____________________ is a capability of a Trojan horse that allows hackers to remotely access, download, and execute files on your computer.
Q:
A(n) ____________________ virus infects a miniature program used to automate document and worksheet production.
Q:
A(n) ____________________ is what a virus may deliver to your computer.
Q:
Hand-geometry scanners and voice recognition are examples of ____________________ devices.
Q:
Data backups and disaster recovery plans are examples of ____________________ procedure countermeasures against computer threats.
Q:
A ____________________ protector is an appliance that protects devices from voltage spikes.
Q:
____________________ is a security feature that verifies that the person accessing the data is the person who has the access.
Q:
A power ____________________ is a complete loss of power to a computer system.
Q:
Human error, also called ____________________ error, includes entering inaccurate data or not following procedures.
Q:
In the figure above, a(n) ____ backup is performed and restored.a. full c. differentialb. incremental d. registry
Q:
In the figure above, a(n) ____ backup is performed and restored.a. full c. differentialb. incremental d. registry
Q:
In the figure above, the worm enters the original host and other unprotected hosts using ____.a. infected files c. e-mailb. a backdoor d. a packet
Q:
A facility that contains its own power grid and security features in order to safely house computer systems and information is called a(n) ____ center.a. data c. recoveryb. information d. disaster
Q:
Which of the following is NOT true about recovery CDs?a. Windows XP's backup software creates Automated System Recover discs. c. Some will wipe out all of your data.b. They contain only the operating system kernel. d. They are sometimes included with a new computer system.
Q:
When storing your backup files on a LAN, consider each of the following EXCEPT:a. The size of your backup files. c. That the server is backed up regularly.b. Password-protected folders to prevent unauthorized access. d. You should consider all of the above.
Q:
If your hard drive crashes, first restore the files from your last full backup, then from your last ____ backup.a. partial c. differentialb. restoration d. registry
Q:
A(n) ____ backup makes a backup of the files that changed since the last backup, no matter what type of backup it was.a. incremental c. partialb. differential d. restoration
Q:
The Windows ____ is a file that stores configuration information about the devices and software installed on a computer system.a. root directory c. Registryb. backup d. Explorer
Q:
A(n) ____ backup contains a copy of every program, data, and system file on a computer.a. restoration c. differentialb. bootstrap d. full
Q:
A(n) ____ virus removes its signatures from a disk-based file and conceals itself in memory.a. Trojan horse c. stealthb. multi-partite d. polymorphic
Q:
A(n) ____ virus could infect different targets in order to escape detection.a. Trojan horse c. multi-partiteb. polymorphic d. stealth
Q:
A virus ____ is a file that your antivirus software uses to identify and eradicate viruses.a. signature c. checksumb. definition d. patch
Q:
A(n) virus ____ is a unique series of bytes used to identify a known virus.a. fingerprint c. signatureb. ID d. definition
Q:
Which of the following is NOT true about bots?a. They are easier to detect than viruses. c. They can perform good tasks, such as searching for available jobs.b. They can be used to link together infected computers. d. They can gain access through security holes in an operating system.
Q:
____ is malicious code that encrypts documents and files.a. Keylogger c. Retro virusb. Ransomware d. Trojan horse
Q:
A(n) ____ virus deletes the files containing virus descriptions from your antivirus software.a. bot c. retrob. ransomware d. spam
Q:
Which of the following is a common source of viruses?a. Removable storage media c. HTML code in e-mailsb. Noncommercial CDs d. All of the above can contain viruses.
Q:
Which of the following is NOT an example of a mass-mailing worm?a. Beagle c. MyDoomb. Bagle d. Padodor
Q:
Which of the following is NOT one of the steps a worm makes when infecting a computer system?a. Propagates while looking for other hosts. c. Creating a backdoor.b. Entering the host computer through e-mail. d. Invading unprotected hosts through e-mail
Q:
A virus that overwhelms a network's capacity is called a(n) ____ attack.a. boot sector c. payloadb. malicious d. denial-of-service
Q:
A ____ is one term for someone who uses computers to gain unauthorized access, steal information, or crash a computer system.a. cracker c. wormb. Trojan horse d. bot
Q:
A ____ is a program that seems to perform one function, while actually doing something else.a. malicious c. macrob. worm d. Trojan horse
Q:
Direct source input devices, including ____, collect data directly from a document or object.a. bar code readers c. firewallsb. biometrics d. surge strips
Q:
Which of the following is NOT a category of preventative countermeasures against computer threats?a. deterrents c. corrective proceduresb. detection activities d. botnets
Q:
____ is the term used to describe the infliction of viruses and worms to destroy data and interrupt computer functioning.a. Hacking c. Operator errorb. Cyberterrorism d. Critical data loss
Q:
A power ____ can be caused by a malfunction in the power distribution network.a. failure c. voltageb. surge d. error
Q:
MTBF is a rating that attempts to measure the time before a(n) ____ failure occurs.a. hardware c. powerb. software d. operator
Q:
In the figure above, an incremental backup is performed and restored.
Q:
In the figure above, a computer system is infected by a worm.
Q:
A good place to store your backup software is on your backup disks.
Q:
The type of backup software you use depends on the storage media you choose.
Q:
The Windows XP Backup Utility creates a set of discs called a recovery CD.
Q:
Because they store your files remotely, a Web site offering fee-based backup storage is a good place to store all of your backup files.
Q:
The best place to store your backup disks is right next to the computer.
Q:
Because it saves you time in the event your hard drive fails, it is recommended that you perform a full backup every day.
Q:
An incremental backup makes a backup of only the files that were added or changed since your last full backup session.
Q:
A full backup makes copies of every file on your computer.
Q:
The Windows Registry is always open, so it may not be copied by backup software without being directed to.
Q:
A checksum is a calculation of bytes used to identify a known virus.
Q:
When you receive an e-mail about a virus, you should follow the instructions in it to protect yourself from contracting the virus.
Q:
A polymorphic virus mutates by changing its signature to escape detection.
Q:
A denial-of-service attack disables your antivirus software on your computer.
Q:
Some worms can block users from accessing certain Web sites and can change the home page settings of a computer.
Q:
Bad bots were originally called remote-access Trojan horses.
Q:
Software publishers often put links to software patches directly in an e-mail.
Q:
Bots are harder to detect than viruses or worms.
Q:
An estimated 66% of spam circulating on the Internet is sent through botnets.
Q:
Using HTML format for your e-mails increases your risks of receiving a virus.
Q:
Web sites that contain games are common sources of viruses.
Q:
All viruses have .exe file extensions.
Q:
Some viruses are programmed to release on a certain date or in response to an event.
Q:
A worm attacks all of the files on your computer one by one.
Q:
A keylogger is a program that records your keystrokes in order to steal your passwords.
Q:
Firewalls are software that prevent unauthorized access to a system.
Q:
Biometrics is a security measure that restricts access based on physical trait, such as finger prints.
Q:
Power strips offer similar protection to surge strips.
Q:
A surge strip offers an uninterruptible power supply.
Q:
A power spike is another term for power surge.
Q:
MTBF measures the security risks of a computer system.