Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Technology In Action Complete Study Set 4
Quiz 9: Securing Your System: Protecting Your Digital Data and Devices
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 121
Multiple Choice
Which of the following are considered slightly different from viruses because they can run without user interaction?
Question 122
Short Answer
________ occurs when malicious code is planted on your computer, either by viruses or by your visiting malicious websites, which then alters your browser's ability to find web addresses.
Question 123
Multiple Choice
Someone who hacks into a computer system to find and fix security vulnerabilities is known as a(n) ________.
Question 124
Matching
Match each of the following terms to its definition:
Premises:
Responses:
packet sniffer
a virus that changes its own code to avoid detection
polymorphic virus
a program that examines the contents of all network traffic
worm
appears to be useful but does something malicious in the background
Premises:
packet sniffer
polymorphic virus
worm
Responses:
a virus that changes its own code to avoid detection
a program that examines the contents of all network traffic
appears to be useful but does something malicious in the background
Question 125
Short Answer
________ are new browser windows launched by a website.
Question 126
Short Answer
A type of virus that temporarily erases itself from files and stores itself in memory to avoid detection is called a(n) ________ virus.
Question 127
Short Answer
________ tries to convince you that your computer is infected.
Question 128
Short Answer
A(n) ________ is a program that appears to be useful or desirable but does something malicious in the background without your knowledge.
Question 129
Short Answer
________ is software that has a malicious intent.
Question 130
Multiple Choice
A(n) ________ is a program that analyzes the contents of data packets on a network.
Question 131
Short Answer
Anyone who breaks into a computer system is known as a(n) ________.
Question 132
Multiple Choice
These are all important protective measures for preventing viruses EXCEPT ________.
Question 133
Multiple Choice
Which of the following virus types changes its own code to avoid detection?
Question 134
Short Answer
________ are often used to perform legitimate functions on websites, such as collecting names and addresses of customers, but some can be malicious and can infect your computer with a virus.