Match the following terms to their meanings:

I. Malware installed from a malicious Web site A. EFS
II. Stores your data in an encrypted format on a hard drive B. event log
III. Security feature that encrypts all the data stored C. drive-by downloads
on a volume
IV. Displays detailed information about significant D. BitLocker Drive
actions on a computer Encryption
V. Record of your computer's actions E. Event Viewer


C, A, D, E, B

Computer Science & Information Technology

You might also like to view...

Media that is used to collect digital evidence must be forensically ____.

A. sterile B. codified C. hashed D. blocked

Computer Science & Information Technology

Provide examples of data mining applications.

What will be an ideal response?

Computer Science & Information Technology

Which of the following is NOT identified in the textbook as a major job hunting resource?

A) Job fair B) Online job board C) Newspaper classified ad D) Company website

Computer Science & Information Technology

The ________ tool is a tool in the Office 365 calendar that allows the user to request a meeting at a time the recipient is free

Fill in the blank(s) with correct word

Computer Science & Information Technology