IS 101 ic3 security quiz
If your debit card has been compromised and you wait more than 2 days, but fewer than 2 months after you learn about the loss, you can be liable for up to
$500
Which 2 of the following can help prevent a virus infection
1: Adjust your web browsers security settings to allow browsing only on trusted sites 2: never bypass your browsers built in security features
Which three of the following are considered e-commerce transactions?
B2B, C2C, C2B
Which of the following are popular password management apps?
Last pass
In the user accounts area of the control panel in microsoft windows, where would you click to grant a colleague administrator privileges?
Manage another account
Experts suggest using password_______software to keep your password safe
Management
Select the three statements that are true regarding a WiFi SSID
One; an SS ID is the WiFi name Two; most routers transmit the SS ID every few seconds so roaming devices can find the signal
Select three true statements regarding persistent cookies
One; collect information about user preferences Two; collect information about the IP address Three; collect password and username information
A secret code to help prevent unauthorized access to user accounts
Password
A virtual __________ network creates a secure connection between 2 computers
Private
Typically computer viruses must be ________ to attack and do damage to a digital device
Run
What type of cookie is stored in temporary memory and is lost when the web browser is closed?
Session
Often accompanying downloaded music or apps, programs that appear to be legitimate but executes an unwanted activity when activated is called a
Trojan
What is a safe and handy way to manage different passwords?
Use a password manager
Select 3 true statements about the privacy risks with cookies
1: websites using cookies can collect your info and sell it to third parties. 2: websites can track your surfing behavior and create a profile. 3: corporate and government entities can track your web behavior.
Malware is designed to do which of the following
Steal information Destroy data Incapacitate a computer or network
In microsoft windows control panel where would you click first to give a colleague administrator privileges
User accounts
Select the three true statements regarding session cookies
1: Analyze and measure traffic on a webpage 2: determine at the start and end of a session 3: determine the web browser being used
What protocol identifies that an internet transmission is secure?
HTTPS
Hypertext transfer protocol_______htTPS helps to create secure data transmission over the Internet
Secure
Craig received an email stating that his bank needed his online banking account password and that he should send it in the reply this sort of fishing is a type of________engineering
Social
Common types of malware include which of the following?
Viruses, worms, Trojan horses
In addition to activating __________ protection, it is also a good idea to disable your routers SSID transmission once your devices are connected
WPA2
Which of the following 2 statements best describe phishing
1: Phishing is the illegitimate use of an email message that appears to be from an established organization 2: phishing scams use legitimate looking email messages to con a user into giving up private info.
Select whats true about passwords
1: Use a combination of letters, symbols, and numbers. The more characters you use, the more secure your password will be. 2: regularly check your accounts to ensure they have not been tampered with.
Select what is true about passwords
1: passwords can be used to secure computers, networks, software, personal accounts, and digital devices. 2: the terms passcode and key are synonymous for password 3:keys are often generated by encryption software of by the vendor who produced the software
Sometimes used in smaller business networks employee________software is impractical for a large network's because the number of users and the potential for miss use
Monitoring
While you sometimes find this used in similar business networks, employee _______ monitoring software is impractical for large networks because of the number of users and the potential for misuse.
Monitoring
Stored on a users hard drive, cookies that collect information about user preferences, password and username information, IP addresses, and data on web surfing behavior are referred to as
Persistent
A type of phishing that seeks to obtain personal information through the use of fraudulent websites is called
Pharming
The illegitimate use of an email message that is sent to collect personal info and appears to be from an established organization such as a bank, financial institution, or insurance company is called
Phishing
The illegitimate use of an email message that is sent to collect personal information and appears to be from an established organization such as a bank,financial institution, or insurance company is called...
Phishing
Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file it will send he file to an isolated area on the hard disk called
Quarentine
Select whats true about trojan malware
Trojans are often found attached to free downloads and apps Trojans are often used to find passwords, destroy data, or to bypass firewalls Trojans are similar to viruses, but do not replicate themselves
If your debit card is fraudulently used to make a purchase there is no guarantee that your money will ever be replaced. This is especially true if you wait too long to report the fraud.
True
Which of the following are considered social engineering
Using fishing tactics to try in a teen credit card information. 2: using a personal relationship to gain unauthorized access to a network
Software that infects computers and is created using computer code is called a computer...
Virus
Select the answer the best finishes the sentence; the standard for wireless network privacy and protection is known as
WPA2