CNET151 - Chapt 9 - Computer Security Technology

CNET151 - Chapt 9 - Computer Security Technology

University

15 Qs

quiz-placeholder

Similar activities

Computer Security Measures

Computer Security Measures

11th Grade - University

20 Qs

CCNA 2 Module 8

CCNA 2 Module 8

11th Grade - University

13 Qs

UH 1 AIJ XII

UH 1 AIJ XII

1st Grade - University

20 Qs

Computer network and internet mcq test

Computer network and internet mcq test

University

20 Qs

iGCSE Computer Science: Networks

iGCSE Computer Science: Networks

KG - University

16 Qs

TLJ K XII P ASMUI --QUIZ

TLJ K XII P ASMUI --QUIZ

University

20 Qs

UAS Keamanan Sistem Informasi 2019 - A

UAS Keamanan Sistem Informasi 2019 - A

University

20 Qs

Unit 10 - Packet Switching

Unit 10 - Packet Switching

12th Grade - University

10 Qs

CNET151 - Chapt 9 - Computer Security Technology

CNET151 - Chapt 9 - Computer Security Technology

Assessment

Quiz

Computers

University

Medium

Created by

Karen Diggs

Used 30+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A list of virus definitions is typically in a small file with a __________ extension.

.dat

.txt

.vir

.def

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Typically, when you update virus definitions __________.

The virus program scans your computer

Your computer restarts

You are updating the virus definition file on your computer

None of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A file that stays in memory after it executes is a(n) __________.

Terminate and stay resident (TSR) program

Executable

Text file

Bug

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The virus scanning technique that uses rules to determine if a program behaves like a virus is __________ scanning.

Download

File

Heuristic

Sandbox

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The virus scanning technique that means you have a separate area isolated from the operating system in which a file is run, so it won’t infect the system is __________.

Download

File

Heuristic

Sandbox

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Java and ActiveX codes should be scanned before they are __________.

Downloaded to your computer

Known about

Infected

Filtered

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Mistaking a legitimate program for a virus is a __________.

Heuristic error

False negative

False positive

Download error

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?