Computer Security and Privacy Module

¡Supera tus tareas y exámenes ahora con Quizwiz!

When you see https in a website address, you can trust the website. TRUE or FALSE

True . Https tells you that the website uses encrypted communication.

A firewall is an effective way to protect against human threat. TRUE or FALSE

True. A firewall is one of the recommended strategies for protecting against threats.

Parents should talk to their children and other loved ones about online predators. TRUE or FALSE

True. Parents should always be informed and speak to their children and other loved ones to protect them.

Identity theft is an example of virtual theft. TRUE or FALSE

True. Your identity can be stolen virtually.

You should keep your password a secret. TRUE or FALSE

True. A password ensures that only you can log on.

An instant message can have attachments that are meant for malicious purposes. TRUE or FALSE

True. An instant message can have attachments that are meant for malicious purposes.

Phishing is a common activity used to extract personal information from computer users and use the information for malicious purposes. TRUE or FALSE

True. Phishing extracts personal information and uses it for malicious purposes.

M1cr0s0ft! is a strong password TRUE or FALSE

True. This password has a lowercase and an uppercase letter and also a symbol and number.

Restricting access to your computer can keep data safe from others. TRUE or FALSE

True. You can set different levels of access to control who sees your information.

Is any potential damage to your computer a threat? YES or NO

Yes. Any damage that can happen to your computer is always a threat.

Can flames melt components of the computer? YES or NO

Yes. The extreme heat can melt sensitive components.

What is a hacker?

A person that tries to illegally access your computer is a hacker.

Trojan viruses can be stopped with...

Antivirus software can stop most viruses that try to infect your computer.

How often should you back up data?

Back up your data on a regular schedule so that your backups include current files and programs

Whom do online predators target?

Both children and the elderly are often targeted.

Plugging the computer into the wall power outlet will protect it from damage. TRUE or FALSE

False. A computer that is plugged directly into the wall outlet is vulnerable to damaging power surges.

Spam emails can be stopped with...

Email filters. An email filter will move any spam to the Junk Email folder.

What additional measures can be taken to protect your computer from physical damage?

Installing an air conditioner, using fire-retardant surroundings, and turning off a computer during a storm can protect the computer from physical damage.

What is computer privacy?

Keeping your personal files and data secure and a secret from unauthorized viewing or tampering is called computer privacy.

What is a component that a power surge can destroy?

The motherboard can be destroyed by a sudden power surge


Conjuntos de estudio relacionados

Small Business Accounting Review Questions

View Set

Chapter 4: Colors; Language of Color

View Set

Chapter 8 - Uses of Life Insurance

View Set

Histology - Esophagus and stomach

View Set

THURSDAY LONG QUIZ 4 FCKING CHAPTERS

View Set

Unit 1-3 Vocab synonyms, antonyms, parts of speech

View Set

Double Negatives Language Arts 800

View Set

Introduction to Linux - Chapter 13

View Set