190 likes | 332 Views
Welcome! The Topic For Today Is…. Chapter 9. Digital Lifestyle: Protecting Digital Data and Devices. By Lyka , Laurel, Gaby and Maria. Chapter 9. 200. 200. 200. 400. 400. 400. 600. 600. 600. 800. 800. 800. 1000. 1000. 1000. Multiple Choice: 200. Question:
E N D
Welcome! The Topic For Today Is…
Chapter 9 Digital Lifestyle: Protecting Digital Data and Devices By Lyka, Laurel, Gaby and Maria
Chapter 9 • 200 • 200 • 200 • 400 • 400 • 400 600 • 600 • 600 • 800 • 800 • 800 • 1000 • 1000 • 1000
Multiple Choice: 200 Question: Computer viruses that are triggered when a certain condition is met are known as a. Logic bombs b.Time bombs c.Stealth viruses d. Multipartite virus Answer a. Logic bombs Back
Multiple Choice: 400 Question: Viruses that periodically change their code to avoid detection are called a. Stealth viruses b. Script viruses c. Polymorphic viruses d. Macro viruses Answer c. Polymorphic viruses Back
Multiple Choice: 600 Question: Portions of virus code that are unique to a particular computer virus are known as a. Master boot records b. Virus signature c. Virus footprints d. Virus traces Answer: b. Virus signature Back
Multiple Choice: 800 Question: Hackers who break into system just for the challenge, or to bring system vulnerabilities to light for the greater good, are called a. Black hat hackers b. Script kiddies c. Valiant hackers d. White hat hackers Answer d. White hat hackers Back
Multiple Choice: 1000 Question: Programs that allow hackers to take almost complete control f a computer without the owner’s knowledge are known as: a. Trojan horses b. Backdoor programs c. Steal viruses d. None of the above Answer: b. Backdoor programs Back
Fill in the Blanks: 200 Question: ___________ is a technique that uses verbal or written communication to generate human interaction that tricks individuals into revealing sensitive information. Answer: Phishing Back
Fill in the Blanks: 400 Question: When hackers use computers to launch an attack on another computer, the computer used to stage the attack are known as _____________ Answer: zombies Back
Fill in the Blanks: 600 Question: Firewalls make it harder for a hacker to locate specific computers on a network, repeatedly change the IP address of the router, and filter out unauthorized request for data, but they do not ____ unused logical ports to decrease network vulnerability Answer: close Back
Fill in the Blanks: 800 Question: _______ is the act of planting codes on a computer that alter the computer browser’s ability to find Web addresses is a type or cyberannoyance. Answer: Pharming Back
Fill in the Blanks: 1000 Question: ______ are viruses that attempt to travel between systems through network connections to spread their infections. Answer: Worms Back
True or False: 200 Question: Viruses that render your files unusable in an attempt to exhort money to have them restored are known as stealth viruses Answer: False Back
True or False: 400 Question: A properly installed surge protector will protect a computer from all power surges Answer: False Back
True or False: 600 Question: Installing a firewall on your network will not stop most viruses from being planted on your network Answer: True Back
True or False: 800 Question: E-mails designed to trick you into revealing information (such as bank account numbers) are a type of phishing scam. Answer: True Back
True or False: 1000 Question: If you have designed strong passwords, then there is never a need to change them. Answer: False Back