Chapter Four IT105

Is this your test? Login to manage it. If not, you can generate an assessment just like it.

This is a non-interactive preview of the quiz content.

1.
3 points
copy entire computer system to create restore purposes
2.
3 points
process used by antivirus software to detect files viral activity current & old
3.
3 points
detect viruses protect computers and files from harm
4.
3 points
large software application robots or bots runs without user on large computers
5.
3 points
software downloaded without your knowledge while surfing the web
6.
3 points
automatic zombie computer attack same time
7.
3 points
is anything unrelated to the job like playing games
8.
3 points
only files that changed since the last backup
9.
3 points
small text file automatically store on hard drive when you visit sites
10.
3 points
all connected to identify each other with a set of 4 numbers
11.
3 points
an individual who uses computers, network, internet to perpetrate crime
12.
3 points
transmitted by email it uses the victims email system to distribute
13.
3 points
destroys data if someone continues to guess access info or password
14.
3 points
spyware that steals passwords login id’s and monitors keystrokes
15.
3 points
human biology to identify authorized users
16.
3 points
a virus distributed by hiding inside macro
17.
3 points
anyone who breaks into computers or a network
18.
3 points
copy of computer files incase original is lost or damage
19.
3 points
assigned internet protocol (IP) addresses when user logon the net
20.
3 points
firewall ignore all incoming access request and block request
21.
3 points
malicious program searches data files using cryptic key files unusable
22.
3 points
computer virus runs when dates are keyed off the computers internal clock
23.
3 points
is when legitimate users are denied access due to hackers
24.
3 points
enables hackers to take control without permission
25.
3 points
files that contain stored data
26.
3 points
virtual communication gateway or path enables computer request info
27.
3 points
uses knowledge to destroy or illegally gain information
28.
3 points
downloads & installs freeware programs, games, or utility
29.
3 points
any criminal action through the use of computers
30.
3 points
using personal info for the purpose of defrauding the victim
31.
3 points
untrue email message or website published to deceive others
32.
3 points
software program hardware device to prevent access to computers or networks
33.
3 points
virus replicates master boot record of flash or hard drive