CNET151 - Chapt 9 - Computer Security Technology

CNET151 - Chapt 9 - Computer Security Technology

University

15 Qs

quiz-placeholder

Similar activities

ITF Chapter 1 Computing Devices

ITF Chapter 1 Computing Devices

University

14 Qs

Microsoft Office Advandces 2016

Microsoft Office Advandces 2016

9th Grade - Professional Development

20 Qs

Quiz Mid Semester Data Manajemen

Quiz Mid Semester Data Manajemen

University

10 Qs

QUIZ BAB 4: SISTEM OPERASI

QUIZ BAB 4: SISTEM OPERASI

8th Grade - University

20 Qs

Round 1 ( RHA Learner Contest )

Round 1 ( RHA Learner Contest )

University

20 Qs

Python MCQ

Python MCQ

University

20 Qs

Network topologies

Network topologies

8th Grade - University

20 Qs

WML & WAP

WML & WAP

University

20 Qs

CNET151 - Chapt 9 - Computer Security Technology

CNET151 - Chapt 9 - Computer Security Technology

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Karen Diggs

Used 30+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A list of virus definitions is typically in a small file with a __________ extension.

.dat

.txt

.vir

.def

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Typically, when you update virus definitions __________.

The virus program scans your computer

Your computer restarts

You are updating the virus definition file on your computer

None of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A file that stays in memory after it executes is a(n) __________.

Terminate and stay resident (TSR) program

Executable

Text file

Bug

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The virus scanning technique that uses rules to determine if a program behaves like a virus is __________ scanning.

Download

File

Heuristic

Sandbox

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The virus scanning technique that means you have a separate area isolated from the operating system in which a file is run, so it won’t infect the system is __________.

Download

File

Heuristic

Sandbox

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Java and ActiveX codes should be scanned before they are __________.

Downloaded to your computer

Known about

Infected

Filtered

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Mistaking a legitimate program for a virus is a __________.

Heuristic error

False negative

False positive

Download error

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?