Informatic Assistant

Is this your test? Login to manage it. If not, you can build a test just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
__________cookies are also known as transient cookies.
2.
1 point
Which of the following will not protect you from spam?
3.
1 point
In the right setting a thief will steal your information by simply watching what you type.
4.
1 point
The __________ of a threat measures its potential impact on a system.
5.
1 point
To read the system messages and warnings, access the __________ in Windows.
6.
1 point
A hacker that changes or forges information in an electronic resource, is engaging in __________.
7.
1 point
To recover files from a backup, you perform a __________.
8.
1 point
This power protection device includes a battery that provides a few minutes of power.
9.
1 point
Hackers often gain entry to a network be pretending to be at a legitimate computer.
10.
1 point
The phrase __________ describes viruses, worms, Trojan horse attack applets, and attack scripts.
11.
1 point
The power level drops below 120V.
12.
1 point
A hacker contacts you by phone or email and attempts to acquire your password.
13.
1 point
A __________ is a small program embedded inside of a GIF image.
14.
1 point
The __________ prevents unlawful access to voice communications by wire.
15.
1 point
To create a copy of files in the event of system failure, you create a __________.
16.
1 point
A __________ is anything that can cause harm.
17.
1 point
A __________’s main purpose is to prohibit unauthorized access to your computer via the Internet.
18.
1 point
Before discarding a financial document, you should __________.
19.
1 point
If configured correctly, the __________ will prevent interaction with your computer after a specified time period.
20.
1 point
You should keep credit card and pay statements for at least _________ years.