This quiz from the Computers Memory Chapter 9 focuses on cybersecurity threats and prevention methods. It assesses knowledge on spyware, viruses, worms, firewalls, and anti-theft measures for computing devices, crucial for anyone learning or working in IT security.
Macro
Stealth
Logic
Rate this question:
Execution timing
A milli sec
A bat
A worm
Rate this question:
Logical port blocking
Static addressing.
Packet switching.
Packet filtering.
Rate this question:
Attaching a motion alarm.
Installing software that can signal your notebook's location.
Installing an external hard drive.
Locking your notebook to a work surface.
Rate this question:
Encryption code
Virus signature
Compression code
Virus pattern
Rate this question:
Change your password frequently.
Create a hard-to-guess password, with a combination of letters, numbers, and symbols.
keep your password written down and stored in any easy-to-remember location.
Keep your password a secret.
Rate this question:
Entering through its Internet connection
overhearing your password and log-on information
Sitting down at a computer and installing hacking software
Entering through a company intranet
Rate this question:
Antivirus software
Host program
Hard drive
Files on the computer
Rate this question:
Scanning
Inoculation
Quarantining
Encryption
Rate this question:
Personal
Biological
Identity
Biometric
Rate this question:
modems
Routers
Switches
Network interface cards (NICs)
Rate this question:
Old surge protectors can deliver power to your computer without protecting it.
Power surges can be blocked by using a computer surround.
Data line surges can be blocked by using a computer surround
It is best to unplug computers during an electrical storm.
Rate this question:
Convert logical ports to physical port configurations
hide user IP addresses from the Internet
Dynamically assign IP addresses via an ISP
Translate IP addresses from the Internet
Rate this question:
Prank
Joke
Legend
Hoax
Rate this question:
A worm
A time bomb
A script virus
An e-mail virus
Rate this question:
a Trojan horse
A virus
A worm
A zombie
Rate this question:
Stealth
Multipartite
Polymorphic
Worm
Rate this question:
Script virus
Macro virus
Polymorphic virus
Worm
Rate this question:
Trojan horse
Packet sniffer
Backdoor program
DDoS
Rate this question:
Engineering
Theft
Pretexting
Pharming
Rate this question:
Firewall
Packet filter
A packet sniffer
Antivirus filter
Rate this question:
Boot-sector virus
Time bomb
Logic bomb
Trojan horse
Rate this question:
Quiz Review Timeline (Updated): Mar 16, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.