ITE 100 EXAM PREP - COOKIES (MODULE 5)
Passwords are the most common type of authentication in use today. - Answers -True
A differential backup copies ______. - Answers -only the files that have changed since
the last full backup
Your digital footprint is the ______. - Answers -record of everything you do online
Jack's roommate recommended that they participate in a digital detox. During this time
period, Jack and his roommate will ______. - Answers -take a break from their digital
devices
Val works in the IT department of a large enterprise. In order to implement green
computing practices, he recommends virtualization in order to ______. - Answers -
share computing resources among computers and devices on the network
A company's AUP might specify the personal activities that are allowed on company
time. - Answers -True
A company can use a proxy server to ______. - Answers -control which
communications pass in and out of the organization's network
It is illegal for employers to use employee monitoring software.
- Answers -True
A zombie is a program that performs a repetitive task on a network. - Answers -False
Jiun visits a website that uses a CAPTCHA as a security method to ______. - Answers
-verify user input is from a human input
A computer worm _____. - Answers -copies itself repeatedly, using up resources and
possibly shutting down the computer, device, or network
A MAC address control feature ______. - Answers -specifies which computers and
mobile devices can connect to a network
CDP copies ______. - Answers -all data whenever a change is made
Rajon got a notification from his antivirus app that his device was infected with a rootkit.
This type of program _____. - Answers -hides in a computer or device and allows
someone from a remote location to take full control of the device
Passwords are the most common type of authentication in use today. - Answers -True
A differential backup copies ______. - Answers -only the files that have changed since
the last full backup
Your digital footprint is the ______. - Answers -record of everything you do online
Jack's roommate recommended that they participate in a digital detox. During this time
period, Jack and his roommate will ______. - Answers -take a break from their digital
devices
Val works in the IT department of a large enterprise. In order to implement green
computing practices, he recommends virtualization in order to ______. - Answers -
share computing resources among computers and devices on the network
A company's AUP might specify the personal activities that are allowed on company
time. - Answers -True
A company can use a proxy server to ______. - Answers -control which
communications pass in and out of the organization's network
It is illegal for employers to use employee monitoring software.
- Answers -True
A zombie is a program that performs a repetitive task on a network. - Answers -False
Jiun visits a website that uses a CAPTCHA as a security method to ______. - Answers
-verify user input is from a human input
A computer worm _____. - Answers -copies itself repeatedly, using up resources and
possibly shutting down the computer, device, or network
A MAC address control feature ______. - Answers -specifies which computers and
mobile devices can connect to a network
CDP copies ______. - Answers -all data whenever a change is made
Rajon got a notification from his antivirus app that his device was infected with a rootkit.
This type of program _____. - Answers -hides in a computer or device and allows
someone from a remote location to take full control of the device