CNET151 - Chapt 9 - Computer Security Technology

CNET151 - Chapt 9 - Computer Security Technology

University

15 Qs

quiz-placeholder

Similar activities

UBL JARKOM CHAP8

UBL JARKOM CHAP8

University

10 Qs

Digital Icons

Digital Icons

12th Grade - University

16 Qs

PARC Linux Basic Part 2

PARC Linux Basic Part 2

University

20 Qs

basisdata1

basisdata1

University

20 Qs

Google Aptitude Test

Google Aptitude Test

KG - University

10 Qs

Linux: Users and Groups

Linux: Users and Groups

9th Grade - University

14 Qs

Simple Way To Build Website

Simple Way To Build Website

University

10 Qs

tik kelas 7

tik kelas 7

1st Grade - University

15 Qs

CNET151 - Chapt 9 - Computer Security Technology

CNET151 - Chapt 9 - Computer Security Technology

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Karen Diggs

Used 30+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A list of virus definitions is typically in a small file with a __________ extension.

.dat

.txt

.vir

.def

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Typically, when you update virus definitions __________.

The virus program scans your computer

Your computer restarts

You are updating the virus definition file on your computer

None of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A file that stays in memory after it executes is a(n) __________.

Terminate and stay resident (TSR) program

Executable

Text file

Bug

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The virus scanning technique that uses rules to determine if a program behaves like a virus is __________ scanning.

Download

File

Heuristic

Sandbox

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The virus scanning technique that means you have a separate area isolated from the operating system in which a file is run, so it won’t infect the system is __________.

Download

File

Heuristic

Sandbox

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Java and ActiveX codes should be scanned before they are __________.

Downloaded to your computer

Known about

Infected

Filtered

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Mistaking a legitimate program for a virus is a __________.

Heuristic error

False negative

False positive

Download error

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?