Search engines that search other search engines are called?
Give this one a try later!
Metasearch engines
A technique that uses illegally obtained information about individuals to perform
targeted attacks in hopes of getting them to reveal sensitive information is known as?
,Give this one a try later!
Spear phishing
What device would you use to amplify your wireless signal?
Give this one a try later!
Wireless range extender
A computer that a hacker has gained control of in order to launch DoS attacks is
known as a ______ computer?
Give this one a try later!
Zombie
Which of the following can be both an input and an output device: mouse, laser
printer, keyboard, or monitor?
Give this one a try later!
Monitor
Which of the following is the fastest data transfer port: VGA, HDMI, USB 3.1,
Thunderbolt?
, Give this one a try later!
Thunderbolt
A backup for all files on your computer, which essentially creates a "snapshot" of what
your computer looks like at that point in time, is known as an?
Give this one a try later!
Image backup
The device used to connect a network to the Internet is called a ?
Give this one a try later!
modem
Software designed to close logical ports in your computer is knob as ?
Give this one a try later!
Firewall
Firewalls work by closing ______ in your computer?
Give this one a try later!
Give this one a try later!
Metasearch engines
A technique that uses illegally obtained information about individuals to perform
targeted attacks in hopes of getting them to reveal sensitive information is known as?
,Give this one a try later!
Spear phishing
What device would you use to amplify your wireless signal?
Give this one a try later!
Wireless range extender
A computer that a hacker has gained control of in order to launch DoS attacks is
known as a ______ computer?
Give this one a try later!
Zombie
Which of the following can be both an input and an output device: mouse, laser
printer, keyboard, or monitor?
Give this one a try later!
Monitor
Which of the following is the fastest data transfer port: VGA, HDMI, USB 3.1,
Thunderbolt?
, Give this one a try later!
Thunderbolt
A backup for all files on your computer, which essentially creates a "snapshot" of what
your computer looks like at that point in time, is known as an?
Give this one a try later!
Image backup
The device used to connect a network to the Internet is called a ?
Give this one a try later!
modem
Software designed to close logical ports in your computer is knob as ?
Give this one a try later!
Firewall
Firewalls work by closing ______ in your computer?
Give this one a try later!