Content Frame
Note for screen reader users: There is text between the form elements on this page. To be sure that you do not miss any text, use item by item navigation methods, rather than tabbing from form element to form element.
Skip Breadcrumb Navigation
Home  arrow Chapter 9  arrow Online Study Guide

Online Study Guide



This activity contains 25 questions.

Question 1.
Boot-sector viruses are usually triggered when __________.


Open Hint for Question 1 in a new window.
 
End of Question 1


Question 2.
The Melissa virus was the first practical example of __________.


Open Hint for Question 2 in a new window.
 
End of Question 2


Question 3.
A(n) __________ is a portion of the virus code that is unique to a particular computer virus.


Open Hint for Question 3 in a new window.
 
End of Question 3


Question 4.
__________ use the tools created by skilled hackers to obtain unauthorized access to computer systems.


Open Hint for Question 4 in a new window.
 
End of Question 4


Question 5.
__________ are often used to launch denial-of-service attacks on other computers.


Open Hint for Question 5 in a new window.
 
End of Question 5


Question 6.
Which of the following will add to the strength of a password?


Open Hint for Question 6 in a new window.
 
End of Question 6


Question 7.
A logical port is a __________.


Open Hint for Question 7 in a new window.
 
End of Question 7


Question 8.
A method of hacking into a Bluetooth-enabled device and taking control is referred to as __________.


Open Hint for Question 8 in a new window.
 
End of Question 8


Question 9.
Face pattern-recognition systems are examples of __________.


Open Hint for Question 9 in a new window.
 
End of Question 9


Question 10.
Spyware is a type of __________ program that usually downloads with other software you install from the Internet.


Open Hint for Question 10 in a new window.
 
End of Question 10


Question 11.
Malicious code that alters your browser's ability to find Web addresses is used in __________.


Open Hint for Question 11 in a new window.
 
End of Question 11


Question 12.
A built-in phishing filter checks for a Web site's legitimacy and warns you of possible Web forgeries.


Open Hint for Question 12 in a new window.
   
 
End of Question 12


Question 13.
A surge protector prevents any type of surge, including all lightning strikes.


Open Hint for Question 13 in a new window.
   
 
End of Question 13


Question 14.
Computers can be damaged from excessive temperatures and dust.


Open Hint for Question 14 in a new window.
   
 
End of Question 14


Question 15.
Phishing is a means of disabling your computer by using adware.


Open Hint for Question 15 in a new window.
   
 
End of Question 15


Question 16.
Both program files and data files should be backed up.


Open Hint for Question 16 in a new window.
   
 
End of Question 16


Question 17.
The default setting on Facebook keeps all of your information from being shared with anyone.


Open Hint for Question 17 in a new window.
   
 
End of Question 17


Question 18.
Cookies only obtain personal information when you fill out forms online.


Open Hint for Question 18 in a new window.
   
 
End of Question 18


Question 19.
Firewalls allow you to send known or suspected spam messages into a folder other than your inbox.


Open Hint for Question 19 in a new window.
   
 
End of Question 19


Question 20.
Grayware is another name for any type of spam.


Open Hint for Question 20 in a new window.
   
 
End of Question 20


Question 21.
An example of a weak password is the use of your last name and the last four digits of your phone number.


Open Hint for Question 21 in a new window.
   
 
End of Question 21


Question 22.
Updating your Windows operating system must be done manually every week.


Open Hint for Question 22 in a new window.
   
 
End of Question 22


Question 23.
One way to create a strong password is to use a combination of numbers and symbols at least 14 characters in length.


Open Hint for Question 23 in a new window.
   
 
End of Question 23


Question 24.
Match each key term with its meaning.




Open Hint for Question 24 in a new window.
A matching question presents 6 answer choices and 6 items. The answer choices are lettered A through F. The items are numbered 24.1 through 24.6. Screen readers will read the answer choices first. Then each item will be presented along with a select menu for choosing an answer choice. Using the pull-down menus, match each item in the left column to the corresponding item in the right column.
A Allows hackers to take almost complete control of your computer without your knowledge
B Travels between systems through network connections to spread an infection
C Changes its own code to avoid detection
D Stops the execution of a file and virus and notifies you that it has detected a virus
E A program that looks at each packet as it travels on the Internet
F A program that appears to be useful, but does something malicious without your knowledge
[hint] 
[hint] 
[hint] 
[hint] 
[hint] 
[hint] 
End of Question 24


Question 25.
Match each key term with its meaning.




Open Hint for Question 25 in a new window.
A matching question presents 5 answer choices and 5 items. The answer choices are lettered A through E. The items are numbered 25.1 through 25.5. Screen readers will read the answer choices first. Then each item will be presented along with a select menu for choosing an answer choice. Using the pull-down menus, match each item in the left column to the corresponding item in the right column.
A Erase their code from the files where they reside and then hide in the active memory of the computer
B Search for common types of data files and compress them in such a way that renders the files unusable
C An attack on your computer caused by Web sites that download harmful software onto your computer
D A series of commands that is executed without your knowledge
E A virus that is triggered when certain logical conditions are met
[hint] 
[hint] 
[hint] 
[hint] 
[hint] 
End of Question 25





Pearson Copyright © 1995 - 2012 Pearson Education . All rights reserved. Pearson Prentice Hall is an imprint of Pearson .
Legal Notice | Privacy Policy | Permissions

Return to the Top of this Page