Chapter 11 T/F MG Matching

Is this your test? Login to manage it. If not, you can develop an exam just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
Uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an over-voltage from reaching the computer and other electronic equipment.
2.
1 point
Malware is a term that can be used to describe _____
3.
1 point
Technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
4.
1 point
A _____ is an assault whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail.
5.
1 point
Script kiddies often are professional hackers that write complex programs used to break into computers.
6.
1 point
A digital signature is a mathematical formula that generates a code from the contents of the message.
7.
1 point
A _____ is a prolonged under-voltage.
8.
1 point
Software piracy continues because _____
9.
1 point
Program placed on a computer without the user's knowledge that secretly collects information about the use.
10.
1 point
Digital rights management (DRM) is a strategy designed to prevent illegal distribution of computer viruses, worms, and Trojan horses.
11.
1 point
Area of the hard disk that holds an infected file until the infection can be removed
12.
1 point
Green computing involves reducing the electricity while using a computer, but the practice increases environmental waste.
13.
1 point
Some businesses use a real time location (RTLS) to track and identify the location of high-risk or high-value items.
14.
1 point
Group of compromised computers connected to a network such as the Internet that is being used as part of a network that attacks other networks, usually for nefarious purposes.
15.
1 point
A honeypot is a computer that is set up to entice an intruder to break into it.
16.
1 point
_____ involves the examination of computer media, programs, data and log files on computers, servers, and networks.
17.
1 point
Many methods exist to guarantee completely a computer or network is safe from computer viruses, worms, and Trojan horses.
18.
1 point
Program that hides within or looks like a legitimate program
19.
1 point
Protects a personal computer and its data from unauthorized intrusions
20.
1 point
Potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user's knowledge or permission.
21.
1 point
Physical access controls, such as locked doors and windows, usually are adequate to protect against.
22.
1 point
Spam sent via VoIP
23.
1 point
translates a personal characteristic into digital code.
24.
1 point
Encrypted (scrambled) data is called plaintext.
25.
1 point
Not all breaches to computer are planned.
26.
1 point
Bio-metric payment involves a customer's fingerprint being read by a fingerprint reader that is linked to a payment method such as a checking account.
27.
1 point
_____ is a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information.
28.
1 point
As related to the use of computers, _____ is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victim's and the naivety of others.
29.
1 point
A phishing filter is a program that attempts to remove spam before it reaches your inbox.
30.
1 point
Cyber-criminals install malicious bots on unprotected computers to create a zombie army.