1 / 19

Welcome! The Topic For Today Is…

Welcome! The Topic For Today Is…. Chapter 9. Digital Lifestyle: Protecting Digital Data and Devices. By Lyka , Laurel, Gaby and Maria. Chapter 9. 200. 200. 200. 400. 400. 400. 600. 600. 600. 800. 800. 800. 1000. 1000. 1000. Multiple Choice: 200. Question:

laken
Download Presentation

Welcome! The Topic For Today Is…

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Welcome! The Topic For Today Is…

  2. Chapter 9 Digital Lifestyle: Protecting Digital Data and Devices By Lyka, Laurel, Gaby and Maria

  3. Chapter 9 • 200 • 200 • 200 • 400 • 400 • 400 600 • 600 • 600 • 800 • 800 • 800 • 1000 • 1000 • 1000

  4. Multiple Choice: 200 Question: Computer viruses that are triggered when a certain condition is met are known as a. Logic bombs b.Time bombs c.Stealth viruses d. Multipartite virus Answer a. Logic bombs Back

  5. Multiple Choice: 400 Question: Viruses that periodically change their code to avoid detection are called a.       Stealth viruses b.      Script viruses c.       Polymorphic viruses d.      Macro viruses Answer c.       Polymorphic viruses Back

  6. Multiple Choice: 600 Question: Portions of virus code that are unique to a particular computer virus are known as a. Master boot records b. Virus signature c. Virus footprints d. Virus traces Answer: b. Virus signature Back

  7. Multiple Choice: 800 Question: Hackers who break into system just for the challenge, or to bring system vulnerabilities to light for the greater good, are called a. Black hat hackers b. Script kiddies c. Valiant hackers d. White hat hackers Answer d. White hat hackers Back

  8. Multiple Choice: 1000 Question: Programs that allow hackers to take almost complete control f a computer without the owner’s knowledge are known as: a. Trojan horses b. Backdoor programs c. Steal viruses d. None of the above Answer: b. Backdoor programs Back

  9. Fill in the Blanks: 200 Question: ___________ is a technique that uses verbal or written communication to generate human interaction that tricks individuals into revealing sensitive information. Answer: Phishing Back

  10. Fill in the Blanks: 400 Question: When hackers use computers to launch an attack on another computer, the computer used to stage the attack are known as _____________ Answer: zombies Back

  11. Fill in the Blanks: 600 Question: Firewalls make it harder for a hacker to locate specific computers on a network, repeatedly change the IP address of the router, and filter out unauthorized request for data, but they do not ____ unused logical ports to decrease network vulnerability Answer: close Back

  12. Fill in the Blanks: 800 Question: _______ is the act of planting codes on a computer that alter the computer browser’s ability to find Web addresses is a type or cyberannoyance. Answer: Pharming Back

  13. Fill in the Blanks: 1000 Question: ______ are viruses that attempt to travel between systems through network connections to spread their infections. Answer: Worms Back

  14. True or False: 200 Question: Viruses that render your files unusable in an attempt to exhort money to have them restored are known as stealth viruses Answer: False Back

  15. True or False: 400 Question: A properly installed surge protector will protect a computer from all power surges Answer: False Back

  16. True or False: 600 Question: Installing a firewall on your network will not stop most viruses from being planted on your network Answer: True Back

  17. True or False: 800 Question: E-mails designed to trick you into revealing information (such as bank account numbers) are a type of phishing scam. Answer: True Back

  18. True or False: 1000 Question: If you have designed strong passwords, then there is never a need to change them. Answer: False Back

  19. That’s all, butthanks for playing!!!

More Related