Front | Back |
FOr complete protection when backing up your files, you should use a program that creates a_______ of your entire system.
|
Image backup
|
A )_______ virus temporarily erases its code from the files where they reside and then hides in the computer's active memory.
|
Stealth
|
A computer virus normally attaches itself to another computer program known as a:
|
Trojan horse
|
Assigning IP addresses when users log on to their ISP is known as________.
|
Dynamic addressing
|
The most likely method a hacker would use to access a computer is:
|
Entering through the internet
|
Devices that use a unique personal characteristic, such as a fingerprint, in place of a password are called______ authentication devices.
|
Biometric
|
A _______ is a virus that is triggered when certain conditions are met, such as a file opening or starting a program a certain number of times.
|
Logic bomb
|
Hackers who use their knowledge to break into systems just for the fun of it refer to themselves as _________ hackers.
|
White hat
|
THe best defense against viruses is to install________ which is specifically designed to detect viruses and protect your computer and files from harm.
|
Antivirus software
|
_______ is the act of tricking people into revealing sensitive information and is often associated with credit card fraud.
|
Phishing
|
The malicious activity perpetrated by a Trojan horse program is often the installation of a _______ program.
|
Backdoor
|
A ______ is a virus that is attached to documents such as Word or Excel files.
|
Macro virus
|
A majority of online credit card fraud results from:
|
Phishing
|
Which of the following classifications of viruses can change its own code?
|
Polymorphic
|
_______ software can identify and eliminate known viruses effectively.
|
Antivirus
|