Questions and CORRECT Answers
1. A ________ is a device that provides a continuous supply power during a power failure
and prevents spikes and surges from reaching your computer - CORRECT ANSWER✔✔- D.
UPS
2. A(n)________ contains multiple outlets but can not filter out power spikes and surges -
CORRECT ANSWER✔✔- B. Power Strip
3. A(n)_________ is a series of characters that a user creates to verify his/her user ID -
CORRECT ANSWER✔✔- B. Malware
5. A method of personal identification, called ____________, bases identification on a
physical trait, - CORRECT ANSWER✔✔- C. Biometrics
6. A (n) _____________ is a software or hardware designed to filter out suspicious data
attempting to enter or leave a computer. - CORRECT ANSWER✔✔- A. firewall
7. A computer ________ is a program that reproduces and attaches itself to a file so it can
spread from file to file. - CORRECT ANSWER✔✔- D. Virus
8. A spam filter will help you avoid unwanted - CORRECT ANSWER✔✔- B. email
9. The __________ browsing feature in internet explorer keeps the browser from storing any
data - CORRECT ANSWER✔✔- D. Inprivate
10. A(n) __________ attacks floods network servers with useless traffic. - CORRECT
ANSWER✔✔- B. Denial of service
11. A (n) _____ is a message containg information about the user sent from a web server and
store on the hard drive. - CORRECT ANSWER✔✔- C. cookie
, 12. A computer controlled by a bad bot is called a _____________ - CORRECT
ANSWER✔✔- A. zombie
13. A(n)________is a software that can automate a task when given a command - CORRECT
ANSWER✔✔- D. Intelligent agent
15. A password uses a combination of letters and numbers, but a ______ uses numbers only -
CORRECT ANSWER✔✔- C. PIN
16. Virus experts use_________ threat to describe threats that combine more than one type of
malicious program. - CORRECT ANSWER✔✔- A. blended
17. A virus _______ is a section of program code used to identify a known malicious
program. - CORRECT ANSWER✔✔- D. Signature
18. ________ is an emailed-based or IM scam designed to persuade you to reveal
confidential information - CORRECT ANSWER✔✔- B. phising
19. A _________ is a removable storage medium containg the files needed to start your
computer without accessing the hard drive, - CORRECT ANSWER✔✔- D. boot disk
20. A(n) ______ backup contains a copy of every program data and system file on a computer
- CORRECT ANSWER✔✔- C. full
Unit f
1. A (n) ______ is the combination of hardware, software, and connecting links that transport
data. - CORRECT ANSWER✔✔- c. network
2. From a geographic perspective, networks, can be classified as LAN_______, NAN, MAN,
or WAN, . - CORRECT ANSWER✔✔- A. PAN