Filters
Question type

Study Flashcards

Using a ________, you can screen data coming into the logical ports to see if it comes from a trusted source.


A) packet sniffer
B) DDoS
C) packet filter
D) token

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

A time bomb virus can be triggered on a certain date.

A) True
B) False

Correct Answer

verifed

verified

Which type of virus was the famous Michelangelo virus?


A) A worm
B) A time bomb
C) A script virus
D) An e-mail virus

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

Which of the following is not a computer virus category?


A) Worm
B) Logic bomb
C) Macro
D) Pharming

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

During the process of ________, antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive.

Correct Answer

verifed

verified

Which of the following are considered slightly different from viruses because they can run without user interaction?


A) Spam
B) E-mail viruses
C) Worms
D) Keystroke logger

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

In computing, a ________ is named after a housing construction feature that slows the spread of fires from house to house.


A) firehouse
B) firebreak
C) firewall
D) fire extinguisher

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

ShieldsUP and LeakTest are software programs you can use to test whether ________.


A) your firewall is working correctly
B) your computer is a zombie
C) you have a memory leak
D) packets arrive at their intended destinations

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

________ use a process called network address translation (NAT) to assign internal IP addresses on a network.

Correct Answer

verifed

verified

Unwanted, unsolicited e-mail is referred to as ________.

Correct Answer

verifed

verified

Which of the following is not an example of a factor used in multi-factor authentication?


A) A captcha
B) A password
C) An ID card
D) A fingerprint

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

A(n) ________ virus is a series of commands that is executed without your knowledge.

Correct Answer

verifed

verified

____kits look for security holes in browsers and operating systems that haven't yet been patched by the users.

Correct Answer

verifed

verified

A(n) ________ protects a computer against power surges.

Correct Answer

verifed

verified

A(n) ________ virus temporarily erases its code from the files where it resides, and then hides in the active memory of the computer.

Correct Answer

verifed

verified

To create a secure password, you should use a mixture of uppercase letters, lowercase letters, numbers, and symbols.

A) True
B) False

Correct Answer

verifed

verified

________ hackers break into systems legally for non-malicious reasons such as to test system security vulnerabilities.


A) Black-hat
B) Gray-hat
C) White-hat
D) Green-hat

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

Victims of ________ can spend months, or even years, trying to repair their credit and eliminate fraudulent debts.

Correct Answer

verifed

verified

Viruses, adware, and spyware are referred to collectively as ________.


A) bloatware
B) grayware
C) alertware
D) firmware

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Someone who hacks into a computer system to find and fix security vulnerabilities is known as a(n) ________.


A) white-hat hacker
B) black-hat hacker
C) gray-hat hacker
D) red-hat hacker

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

Showing 61 - 80 of 135

Related Exams

Show Answer