Podcast
Questions and Answers
When someone uses your personal information to pose as you, this is called?
When someone uses your personal information to pose as you, this is called?
identity theft
Viruses that load from USB drives left connected to computers when computers are turned on are known as?
Viruses that load from USB drives left connected to computers when computers are turned on are known as?
boot-sector viruses
A packet analyzer is called a sniffer because?
A packet analyzer is called a sniffer because?
it captures and reads data inside each packet.
Computer viruses can be spread by which of the following methods? (Select all that apply)
Computer viruses can be spread by which of the following methods? (Select all that apply)
Signup and view all the answers
A ______ is a program that takes complete control of your computer without your knowledge.
A ______ is a program that takes complete control of your computer without your knowledge.
Signup and view all the answers
A backup of all the data files on your computer can be managed easily using the Windows 10 _______ utility.
A backup of all the data files on your computer can be managed easily using the Windows 10 _______ utility.
Signup and view all the answers
Authentication techniques that rely on personal biological traits are called?
Authentication techniques that rely on personal biological traits are called?
Signup and view all the answers
Antivirus software prevents infection by recording key attributes about your files and checking to see if they change over time in a process called?
Antivirus software prevents infection by recording key attributes about your files and checking to see if they change over time in a process called?
Signup and view all the answers
A surge protector may look like just another power strip but it also can?
A surge protector may look like just another power strip but it also can?
Signup and view all the answers
Firewalls use a process of _____________ to assign IP addresses to the devices internal to the network so hackers will not know what they are.
Firewalls use a process of _____________ to assign IP addresses to the devices internal to the network so hackers will not know what they are.
Signup and view all the answers
A 32-character password is an example of using biometrics.
A 32-character password is an example of using biometrics.
Signup and view all the answers
Your social security number should never be shared on a website, in an email, or through messaging.
Your social security number should never be shared on a website, in an email, or through messaging.
Signup and view all the answers
Sending e-mails to lure people into revealing personal information is a technique known as phishing.
Sending e-mails to lure people into revealing personal information is a technique known as phishing.
Signup and view all the answers
Encrypting data is not an appropriate measure for mobile devices such as smartphones.
Encrypting data is not an appropriate measure for mobile devices such as smartphones.
Signup and view all the answers
Virtual private networks make it just as secure to send information across a public network as it is on a secure private network.
Virtual private networks make it just as secure to send information across a public network as it is on a secure private network.
Signup and view all the answers
Study Notes
Identity Theft
- Identity theft occurs when someone uses your personal information to impersonate you.
Boot-Sector Viruses
- Boot-sector viruses are malicious programs that load from USB drives left connected to computers during startup.
Packet Analyzers
- A packet analyzer, commonly referred to as a sniffer, captures and reads data found within packets of information.
Spread of Computer Viruses
- Computer viruses can be propagated through sharing flash drives, downloading malicious email attachments, and peer-to-peer file sharing sites.
Rootkits
- A rootkit is a type of malware that takes complete control over your computer without your awareness.
Data Backup Utility
- File History is a Windows 10 utility designed to manage backups of all data files on your computer efficiently.
Biometrics
- Authentication methods based on unique personal biological traits are known as biometrics.
Inoculation in Antivirus Software
- Antivirus software utilizes a process called inoculation, which records important file attributes and monitors for any changes.
Surge Protectors
- Surge protectors, while appearing similar to power strips, also safeguard devices from voltage spikes in the electrical system.
Network Address Translation (NAT)
- Firewalls implement network address translation (NAT) to assign IP addresses within a network, obscuring device identities from potential hackers.
Password Strength and Biometrics
- A 32-character password does not qualify as a biometric authentication method.
Sharing Sensitive Information
- It is crucial to keep your social security number private and never share it via websites, emails, or messaging apps.
Phishing Attacks
- Phishing is a deceptive technique used to entice individuals into disclosing personal information through fraudulent emails.
Data Encryption for Mobile Devices
- Encrypting data on mobile devices, including smartphones, is essential for securing sensitive information.
Virtual Private Networks (VPNs)
- Virtual private networks ensure that sending information across public networks is as secure as it is on a private network.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on key concepts from Chapter 9 of CIS 105. This quiz covers important topics like identity theft, boot-sector viruses, and packet analysis. Perfect for reinforcing your understanding of computer security and data integrity.