11.07.2015 Views

Summary

Summary

Summary

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

26 IT Essentials: PC Harware and Software Companion GuideCheck Your UnderstandingYou can find the answers to these questions in the appendix, “Answers to Check YourUnderstanding Questions.”1. Which of the following is a software program that displays advertising on your computer?A. AdwareB. SpywareC. GraywareD. Virus2. Which of the following uses the network to duplicate its code to the hosts on a network,often without any user intervention?A. AdwareB. SpywareC. VirusD. Worm3. Which of the following is technically a worm and is a threat that is hidden in softwarethat appears to do one thing, but does another?A. VirusB. SpywareC. AdwareD. Trojan4. Which of the following is a form of attack that prevents users from accessing normalservices, such as e-mail or web server?A. Ping of deathB. Denial of serviceC. E-mail bombD. Distributed denial of service5. Which of the following is an encryption system that protects data as if it is on a privatenetwork, even though the data is actually traveling over the Internet or other unsecuredpublic networks?A. Data encryptionB. Port protectionC. Virtual private networkD. File system security

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!