Review Game Zone
Games
Test
Preview
Back
Match it!
Match it! Select the correct answer from the pull down...Good luck!
What does anti-virus software do?
She should ask you to read her the e-mail message including the full name of the attachment and its extension.
It detects viruses by recognizing patterns called signature profiles, then immediately disinfects your hard drive.
Update
Purchase domain names that are similar to their actual domain names
to call, text or IM James before opening the attachment, to verify that he intended to send it.
Encryption
Update the definitions on your anti-virus application frequently.
A virus requires user action to replicate, but a worm can replicate by itself.
Which statement correctly compares computer viruses and worms?
She should ask you to read her the e-mail message including the full name of the attachment and its extension.
It detects viruses by recognizing patterns called signature profiles, then immediately disinfects your hard drive.
Update
Purchase domain names that are similar to their actual domain names
to call, text or IM James before opening the attachment, to verify that he intended to send it.
Encryption
Update the definitions on your anti-virus application frequently.
A virus requires user action to replicate, but a worm can replicate by itself.
Your computer crashed, and you lost many personal and work-related files. You just got a new computer, but you are now much more concerned about viruses and other security threats. Which strategy can help you protect your computer against viruses?
She should ask you to read her the e-mail message including the full name of the attachment and its extension.
It detects viruses by recognizing patterns called signature profiles, then immediately disinfects your hard drive.
Update
Purchase domain names that are similar to their actual domain names
to call, text or IM James before opening the attachment, to verify that he intended to send it.
Encryption
Update the definitions on your anti-virus application frequently.
A virus requires user action to replicate, but a worm can replicate by itself.
Which term best describes a collection of software tools that provide a permanent solution to known program bugs?
She should ask you to read her the e-mail message including the full name of the attachment and its extension.
It detects viruses by recognizing patterns called signature profiles, then immediately disinfects your hard drive.
Update
Purchase domain names that are similar to their actual domain names
to call, text or IM James before opening the attachment, to verify that he intended to send it.
Encryption
Update the definitions on your anti-virus application frequently.
A virus requires user action to replicate, but a worm can replicate by itself.
You receive an unexpected e-mail with an attachment from a co-worker. You call her to ask if she sent you an e-mail message with an attachment. She recalls that she sent several e-mails with attachments earlier that day. What should the co-worker do?
She should ask you to read her the e-mail message including the full name of the attachment and its extension.
It detects viruses by recognizing patterns called signature profiles, then immediately disinfects your hard drive.
Update
Purchase domain names that are similar to their actual domain names
to call, text or IM James before opening the attachment, to verify that he intended to send it.
Encryption
Update the definitions on your anti-virus application frequently.
A virus requires user action to replicate, but a worm can replicate by itself.
Which of the following is an effective way for Web site owners to prevent typosquatting?
She should ask you to read her the e-mail message including the full name of the attachment and its extension.
It detects viruses by recognizing patterns called signature profiles, then immediately disinfects your hard drive.
Update
Purchase domain names that are similar to their actual domain names
to call, text or IM James before opening the attachment, to verify that he intended to send it.
Encryption
Update the definitions on your anti-virus application frequently.
A virus requires user action to replicate, but a worm can replicate by itself.
Which term is used to describe the process that converts data into an unreadable form of text?
She should ask you to read her the e-mail message including the full name of the attachment and its extension.
It detects viruses by recognizing patterns called signature profiles, then immediately disinfects your hard drive.
Update
Purchase domain names that are similar to their actual domain names
to call, text or IM James before opening the attachment, to verify that he intended to send it.
Encryption
Update the definitions on your anti-virus application frequently.
A virus requires user action to replicate, but a worm can replicate by itself.
Lisa has received a file attachment from a co-worker, James. She has no reason to expect a file from this person. The most effective security strategy for Lisa to follow would be:
She should ask you to read her the e-mail message including the full name of the attachment and its extension.
It detects viruses by recognizing patterns called signature profiles, then immediately disinfects your hard drive.
Update
Purchase domain names that are similar to their actual domain names
to call, text or IM James before opening the attachment, to verify that he intended to send it.
Encryption
Update the definitions on your anti-virus application frequently.
A virus requires user action to replicate, but a worm can replicate by itself.
Check it!