PDF Download
FREE COMPUTERS AND STUDY GAMES ABOUT CCS M8
EXAM QUESTIONS
Actual Qs and Ans Expert-Verified Explanation
This Exam contains:
-Guarantee passing score -99 Questions and Answers -format set of multiple-choice -Expert-Verified Explanation
Question 1: A system ________ is the prolonged malfunction of a computer
Answer:
FAILURE
Question 2: TRUE or FALSE: Many companies use access controls to minimize the chance that a hacker may intentionally access or an employee may accidentally access confidential information on a computer.
Answer:
TRUE Question 3: A computer ________ risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.
Answer:
SECURITY
Question 4: ____ occurs when someone steals personal or confidential information.
Answer:
INFORMATION THEFT
Question 5: Web sites use a ____ to keep track of items in a user's shopping cart.
Answer:
SESSION COOKIES
Question 6: TRUE or FALSE: The best preventive measures against hardware theft and vandalism are common sense and a constant awareness of the risk.
Answer:
TRUE Question 7: A(n) IT code of conduct is a written guideline that helps determine whether a specific computer action is ____.
Answer:
ETHICAL
Question 8: ____ detection software automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access (intrusions), and notifies a network administrator of suspicious behavior patterns or system breaches.
Answer:
INTRUSION
Question 9: TRUE or FALSE: A wireless access point (WAP) should be configured to broadcast a network name, in order to increase security.
Answer:
FALSE
Question 10: A(n) ________ occurs when the electrical supply drops.
Answer:
UNDERVOLTAGE
Question 11: TRUE or FALSE: Undervoltage can cause equipment damage, but generally do not cause data loss.
Answer:
FALSE
Question 12: Some perpetrators use a technique called ________ in which they attempt to connect to wireless networks via their notebook computers while driving a vehicle through areas they suspect have a wireless network.
Answer:
WAR DRIVING
Question 13: ____ use is the use of a computer or its data for unapproved or possibly illegal activities.
Answer:
UNAUTHORIZED
Question 14: TRUE or FALSE: Some security systems for notebook computers shut down the computer and sound an alarm if the computer moves outside a specified distance.
Answer:
TRUE Question 15: A(n) ____ is a numeric password either assigned by a company or selected by a user.
Answer:
PIN Question 16: A personal ____ is a utility program that detects and protects a personal computer and its data from unauthorized access.
Answer:
FIREWALL
Question 17: TRUE or FALSE: An employee using an organization's computer to track his or her child's soccer league scores is an example of unauthorized access.
Answer:
FALSE Question 18: TRUE or FALSE: In order to safeguard personal information, you should not reply to messages sent by unknown sources for any reason.
Answer:
TRUE
Question 19: To ________ a file means to make a copy of it.
Answer:
BACK-UP
Question 20: TRUE or FALSE: Personal firewalls constantly monitor all transmissions to and from a computer and inform users of any attempted intrusion.
Answer:
TRUE Question 21: TRUE or FALSE: Online shopping sites generally use a session cookie to keep track of items in a user's shopping cart.
Answer:
TRUE Question 22: TRUE or FALSE: Carpal tunnel syndrome (CTS) is inflammation of a tendon due to some repeated motion or stress on that tendon.
Answer:
FALSE Question 23: Computer ____ occurs when a computer consumes someone's entire social life.
Answer:
ADDICTION
Question 24: ________ is any unwanted signal, usually varying quickly, that is mixed with the normal voltage entering a computer.
Answer:
NOISE Question 25: TRUE or FALSE: Hardware theft is the act of stealing computer equipment.
Answer:
TRUE Question 26: A(n) ________ is someone who uses the Internet or network to destroy or damage computers for political reasons.