Filters
Question type

Study Flashcards

____ secretly collects user data, such as web surfing habits.


A) Spyware
B) Ransomware
C) All of the above
D) None of the above

Correct Answer

verifed

verified

____ is malicious software that blocks access to a computer system until a sum of money is paid.


A) Ransomware
B) Spyware
C) Hoaxware
D) Pharmware

Correct Answer

verifed

verified

A ____ is a unit of data collected as a package so it can be transmitted in a network path.


A) data packet
B) hotspot
C) BSoD
D) RSI

Correct Answer

verifed

verified

The device that sends the signal to connect your wireless devices to the Internet is ____.


A) wireless router
B) wireless firewall
C) wireless software
D) n one of the above

Correct Answer

verifed

verified

A

Junk email, is also known as ____.


A) malware
B) spam
C) spyware
D) worm

Correct Answer

verifed

verified

Areas in a wireless network where you can access the Internet are ____.


A) hotspots
B) Trojan horses
C) piggybacks
D) war drives

Correct Answer

verifed

verified

Using personal features to identify a person is biometrics.

Correct Answer

verifed

verified

Cloud storage systems have ____ at various online locations that provide additional protection.


A) hackers
B) backups
C) encryption
D) malware

Correct Answer

verifed

verified

B

The effects of a(n) ____ can include physical damage and a general disruption of regular activities.


A) spam event
B) phishing episode
C) war driving incident
D) cyberattack

Correct Answer

verifed

verified

The crime of hacking into and attacking networks is cybercrime.

Correct Answer

verifed

verified

When a hard drive fails, Mac users see the ____.


A) Spinning Hand of Death
B) Grey Fail Screen
C) Marble of Doom
D) Blue Screen of Death

Correct Answer

verifed

verified

Just about every site you visit stores a cookie in your computer's browser.

Correct Answer

verifed

verified

Designing, manufacturing, using, and disposing of electronic products in ways friendly to both people and the environment is Energy Star computing.

Correct Answer

verifed

verified

Service packs ensure that your data is scrambled as it travels between you and its Internet destination.

Correct Answer

verifed

verified

A PIN or ____ is used to get into accounts through an ATM.


A) personal information number
B) personal identification name
C) personal information name
D) personal identification number

Correct Answer

verifed

verified

Biometric systems include all but which of the following?


A) fingerprint scanners
B) hair scanners
C) facial recognition technology
D) eye scans

Correct Answer

verifed

verified

____ disguise themselves as useful programs or apps but do damage when you run them;


A) Trojan horses
B) Rootkits
C) All of the above
D) None of the above

Correct Answer

verifed

verified

____ on the Internet make up "the cloud."


A) Servers
B) Packets
C) Firewalls
D) Routers

Correct Answer

verifed

verified

A password is not a personal identification number.

Correct Answer

verifed

verified

True

A ____ protects your system from intruders.


A) firewall
B) digital wallet
C) digital certificate
D) none of the above

Correct Answer

verifed

verified

Showing 1 - 20 of 71

Related Exams

Show Answer