
CNET151 - Chapt 9 - Computer Security Technology
Authored by Karen Diggs
Computers
University
Used 30+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A list of virus definitions is typically in a small file with a __________ extension.
.dat
.txt
.vir
.def
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Typically, when you update virus definitions __________.
The virus program scans your computer
Your computer restarts
You are updating the virus definition file on your computer
None of the above
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A file that stays in memory after it executes is a(n) __________.
Terminate and stay resident (TSR) program
Executable
Text file
Bug
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The virus scanning technique that uses rules to determine if a program behaves like a virus is __________ scanning.
Download
File
Heuristic
Sandbox
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The virus scanning technique that means you have a separate area isolated from the operating system in which a file is run, so it won’t infect the system is __________.
Download
File
Heuristic
Sandbox
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Java and ActiveX codes should be scanned before they are __________.
Downloaded to your computer
Known about
Infected
Filtered
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Mistaking a legitimate program for a virus is a __________.
Heuristic error
False negative
False positive
Download error
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?