CIS 105 End of Chapter 9 Quiz
15 Questions
100 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

When someone uses your personal information to pose as you, this is called?

identity theft

Viruses that load from USB drives left connected to computers when computers are turned on are known as?

boot-sector viruses

A packet analyzer is called a sniffer because?

it captures and reads data inside each packet.

Computer viruses can be spread by which of the following methods? (Select all that apply)

<p>All of the above</p> Signup and view all the answers

A ______ is a program that takes complete control of your computer without your knowledge.

<p>rootkit</p> Signup and view all the answers

A backup of all the data files on your computer can be managed easily using the Windows 10 _______ utility.

<p>File History</p> Signup and view all the answers

Authentication techniques that rely on personal biological traits are called?

<p>biometrics</p> Signup and view all the answers

Antivirus software prevents infection by recording key attributes about your files and checking to see if they change over time in a process called?

<p>inoculation</p> Signup and view all the answers

A surge protector may look like just another power strip but it also can?

<p>save your device if a voltage spike is sent through the electrical system</p> Signup and view all the answers

Firewalls use a process of _____________ to assign IP addresses to the devices internal to the network so hackers will not know what they are.

<p>network address translation (NAT)</p> Signup and view all the answers

A 32-character password is an example of using biometrics.

<p>False</p> Signup and view all the answers

Your social security number should never be shared on a website, in an email, or through messaging.

<p>True</p> Signup and view all the answers

Sending e-mails to lure people into revealing personal information is a technique known as phishing.

<p>True</p> Signup and view all the answers

Encrypting data is not an appropriate measure for mobile devices such as smartphones.

<p>False</p> Signup and view all the answers

Virtual private networks make it just as secure to send information across a public network as it is on a secure private network.

<p>True</p> Signup and view all the answers

Study Notes

Identity Theft

  • Identity theft occurs when someone uses your personal information to impersonate you.

Boot-Sector Viruses

  • Boot-sector viruses are malicious programs that load from USB drives left connected to computers during startup.

Packet Analyzers

  • A packet analyzer, commonly referred to as a sniffer, captures and reads data found within packets of information.

Spread of Computer Viruses

  • Computer viruses can be propagated through sharing flash drives, downloading malicious email attachments, and peer-to-peer file sharing sites.

Rootkits

  • A rootkit is a type of malware that takes complete control over your computer without your awareness.

Data Backup Utility

  • File History is a Windows 10 utility designed to manage backups of all data files on your computer efficiently.

Biometrics

  • Authentication methods based on unique personal biological traits are known as biometrics.

Inoculation in Antivirus Software

  • Antivirus software utilizes a process called inoculation, which records important file attributes and monitors for any changes.

Surge Protectors

  • Surge protectors, while appearing similar to power strips, also safeguard devices from voltage spikes in the electrical system.

Network Address Translation (NAT)

  • Firewalls implement network address translation (NAT) to assign IP addresses within a network, obscuring device identities from potential hackers.

Password Strength and Biometrics

  • A 32-character password does not qualify as a biometric authentication method.

Sharing Sensitive Information

  • It is crucial to keep your social security number private and never share it via websites, emails, or messaging apps.

Phishing Attacks

  • Phishing is a deceptive technique used to entice individuals into disclosing personal information through fraudulent emails.

Data Encryption for Mobile Devices

  • Encrypting data on mobile devices, including smartphones, is essential for securing sensitive information.

Virtual Private Networks (VPNs)

  • Virtual private networks ensure that sending information across public networks is as secure as it is on a private network.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

Test your knowledge on key concepts from Chapter 9 of CIS 105. This quiz covers important topics like identity theft, boot-sector viruses, and packet analysis. Perfect for reinforcing your understanding of computer security and data integrity.

More Like This

Use Quizgecko on...
Browser
Browser