
Chapter 9: Securing Your System: Protecting Your Digital Data a
Authored by Cindy Philpot
Computers
University

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
13 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
When a hacker steals personal information with the intent of impersonating another individual to commit fraud, it is known as ___________________
impersonation theft
identity theft
scareware theft
malware theft
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
An attack that renders a computer unable to respond to legitimate users because it is being bombarded with data requests is known as a_______ attack.
steath
backdoor
denial-of-service
scareware
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Cookies are ___________________
a type of malware used to track websites you visit.
a tool used by “ransomware as a service” programs.
files installed by your operating system to speed up access to the Internet.
small text files written on your hard drive by a website you visited.
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
A series of commands that are executed without your knowledge is a typical attribute of a(n) ____________ virus.
script
boot-sector
time bomb
encryption
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Software that pretends your computer is infected with a virus to entice you into spending money on a solution is known as ___________________
trackingware
spyware
adware
scareware
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Firewalls work by closing ___________________ in your computer.
software gaps
logical ports
logical doors
backdoors
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Antivirus software looks for ___________________ to detect viruses in files.
virus signatures
virus artifacts
virus bots
virus VPNs
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
16 questions
CyberSafety Pre-Assessment
Quiz
•
KG - University
11 questions
History of Computer Games Quiz
Quiz
•
7th Grade - University
10 questions
UTILITY PROGRAM
Quiz
•
University
10 questions
CSF Week 2
Quiz
•
University
13 questions
Digital Technology Office 365 - 29May2020
Quiz
•
University - Professi...
15 questions
Internet Basics
Quiz
•
5th Grade - University
15 questions
Chapter 1 Basic Computer
Quiz
•
University
13 questions
Historia de la internet
Quiz
•
University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
10 questions
Probability Practice
Quiz
•
4th Grade
15 questions
Probability on Number LIne
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
6 questions
Appropriate Chromebook Usage
Lesson
•
7th Grade
10 questions
Greek Bases tele and phon
Quiz
•
6th - 8th Grade
Discover more resources for Computers
12 questions
IREAD Week 4 - Review
Quiz
•
3rd Grade - University
20 questions
Endocrine System
Quiz
•
University
7 questions
Renewable and Nonrenewable Resources
Interactive video
•
4th Grade - University
30 questions
W25: PSYCH 250 - Exam 2 Practice
Quiz
•
University
5 questions
Inherited and Acquired Traits of Animals
Interactive video
•
4th Grade - University
20 questions
Implicit vs. Explicit
Quiz
•
6th Grade - University
7 questions
Comparing Fractions
Interactive video
•
1st Grade - University
38 questions
Unit 8 Review - Absolutism & Revolution
Quiz
•
10th Grade - University