CNET151 - Chapt 9 - Computer Security Technology

CNET151 - Chapt 9 - Computer Security Technology

University

15 Qs

quiz-placeholder

Similar activities

7333-Redes e Comunicação de Dados

7333-Redes e Comunicação de Dados

University

15 Qs

CN_Minor2

CN_Minor2

University

20 Qs

Kampyuter Tarmoqlari Bo'yicha Test

Kampyuter Tarmoqlari Bo'yicha Test

8th Grade - University

10 Qs

Redes I- Componentes y tipos de redes

Redes I- Componentes y tipos de redes

University

20 Qs

Firewall and Network Security

Firewall and Network Security

University

15 Qs

Materi Search Engine

Materi Search Engine

University

10 Qs

REMEDIAL PAS DDG GANJIL

REMEDIAL PAS DDG GANJIL

University

20 Qs

L1 - Computer Networks

L1 - Computer Networks

University

13 Qs

CNET151 - Chapt 9 - Computer Security Technology

CNET151 - Chapt 9 - Computer Security Technology

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Karen Diggs

Used 30+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A list of virus definitions is typically in a small file with a __________ extension.

.dat

.txt

.vir

.def

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Typically, when you update virus definitions __________.

The virus program scans your computer

Your computer restarts

You are updating the virus definition file on your computer

None of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A file that stays in memory after it executes is a(n) __________.

Terminate and stay resident (TSR) program

Executable

Text file

Bug

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The virus scanning technique that uses rules to determine if a program behaves like a virus is __________ scanning.

Download

File

Heuristic

Sandbox

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The virus scanning technique that means you have a separate area isolated from the operating system in which a file is run, so it won’t infect the system is __________.

Download

File

Heuristic

Sandbox

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Java and ActiveX codes should be scanned before they are __________.

Downloaded to your computer

Known about

Infected

Filtered

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Mistaking a legitimate program for a virus is a __________.

Heuristic error

False negative

False positive

Download error

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?