CNET151 - Chapt 9 - Computer Security Technology

CNET151 - Chapt 9 - Computer Security Technology

University

15 Qs

quiz-placeholder

Similar activities

Sumatif 1 Dampak Sosial Informatika

Sumatif 1 Dampak Sosial Informatika

9th Grade - University

15 Qs

UH 1 TLJ XII TKJ

UH 1 TLJ XII TKJ

1st Grade - University

20 Qs

Introduction to Azure

Introduction to Azure

University

15 Qs

Intro to Linux Network Management Quiz

Intro to Linux Network Management Quiz

University

10 Qs

Soal AIJ bulan Agustus 2019 kls xii

Soal AIJ bulan Agustus 2019 kls xii

University

20 Qs

KSK2023 ulangkaji v1.3

KSK2023 ulangkaji v1.3

KG - University

20 Qs

Free Test  MAPEL AIJ (Fire Wall) Pertemuan 1

Free Test MAPEL AIJ (Fire Wall) Pertemuan 1

University

15 Qs

Unit 10 - Packet Switching

Unit 10 - Packet Switching

12th Grade - University

10 Qs

CNET151 - Chapt 9 - Computer Security Technology

CNET151 - Chapt 9 - Computer Security Technology

Assessment

Quiz

Computers

University

Medium

Created by

Karen Diggs

Used 30+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A list of virus definitions is typically in a small file with a __________ extension.

.dat

.txt

.vir

.def

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Typically, when you update virus definitions __________.

The virus program scans your computer

Your computer restarts

You are updating the virus definition file on your computer

None of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A file that stays in memory after it executes is a(n) __________.

Terminate and stay resident (TSR) program

Executable

Text file

Bug

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The virus scanning technique that uses rules to determine if a program behaves like a virus is __________ scanning.

Download

File

Heuristic

Sandbox

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The virus scanning technique that means you have a separate area isolated from the operating system in which a file is run, so it won’t infect the system is __________.

Download

File

Heuristic

Sandbox

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Java and ActiveX codes should be scanned before they are __________.

Downloaded to your computer

Known about

Infected

Filtered

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Mistaking a legitimate program for a virus is a __________.

Heuristic error

False negative

False positive

Download error

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?