●
One type of CAPTCHA is ________.
○
the wavy hard-to-read letter and number sequence that you type to prove that
you are human to a website
●
Which type of backup ensures you capture a complete snapshot of everything that
makes your computer run?
○
Image
●
This type of network uses the public Internet to send information with the security of a
private network.
○
Virtual private network
●
Configuring a firewall to ignore all incoming packets that request access to a specific
port is known as ________.
○
logical port blocking
●
A(n) ________ is the portion of virus code that is unique to a particular computer virus.
○
virus signature
●
Which of the following is
not an example of a factor used in multi-factor authentication?
○
A captcha
●
Computer ________ involves identifying, extracting, preserving, and documenting
computer evidence.
○
forensics
●
Regarding computer protection, quarantining is defined as ________.
○
placing a found virus in a secure area on the hard drive
●
A(n) ________ backup makes a copy of all changes since the last backup.
○
incremental
●
You can block logical ports from invaders and make your computer virtually invisible to
others on the Internet by installing ________.
○
A firewall
●
Since you can always redownload program files, you do not need to include them in
backups.
○
False
●
An image backup is the same as a system backup.
○
True
●
Computer forensics is used to collect evidence for use in courtrooms.
○
True
●
Multi-factor authentication requires three of four possible authentication factors.
○
False
●
A full backup and an image backup are the same thing.
○
False