IS 101 ic3 security quiz

¡Supera tus tareas y exámenes ahora con Quizwiz!

If your debit card has been compromised and you wait more than 2 days, but fewer than 2 months after you learn about the loss, you can be liable for up to

$500

Which 2 of the following can help prevent a virus infection

1: Adjust your web browsers security settings to allow browsing only on trusted sites 2: never bypass your browsers built in security features

Which three of the following are considered e-commerce transactions?

B2B, C2C, C2B

Which of the following are popular password management apps?

Last pass

In the user accounts area of the control panel in microsoft windows, where would you click to grant a colleague administrator privileges?

Manage another account

Experts suggest using password_______software to keep your password safe

Management

Select the three statements that are true regarding a WiFi SSID

One; an SS ID is the WiFi name Two; most routers transmit the SS ID every few seconds so roaming devices can find the signal

Select three true statements regarding persistent cookies

One; collect information about user preferences Two; collect information about the IP address Three; collect password and username information

A secret code to help prevent unauthorized access to user accounts

Password

A virtual __________ network creates a secure connection between 2 computers

Private

Typically computer viruses must be ________ to attack and do damage to a digital device

Run

What type of cookie is stored in temporary memory and is lost when the web browser is closed?

Session

Often accompanying downloaded music or apps, programs that appear to be legitimate but executes an unwanted activity when activated is called a

Trojan

What is a safe and handy way to manage different passwords?

Use a password manager

Select 3 true statements about the privacy risks with cookies

1: websites using cookies can collect your info and sell it to third parties. 2: websites can track your surfing behavior and create a profile. 3: corporate and government entities can track your web behavior.

Malware is designed to do which of the following

Steal information Destroy data Incapacitate a computer or network

In microsoft windows control panel where would you click first to give a colleague administrator privileges

User accounts

Select the three true statements regarding session cookies

1: Analyze and measure traffic on a webpage 2: determine at the start and end of a session 3: determine the web browser being used

What protocol identifies that an internet transmission is secure?

HTTPS

Hypertext transfer protocol_______htTPS helps to create secure data transmission over the Internet

Secure

Craig received an email stating that his bank needed his online banking account password and that he should send it in the reply this sort of fishing is a type of________engineering

Social

Common types of malware include which of the following?

Viruses, worms, Trojan horses

In addition to activating __________ protection, it is also a good idea to disable your routers SSID transmission once your devices are connected

WPA2

Which of the following 2 statements best describe phishing

1: Phishing is the illegitimate use of an email message that appears to be from an established organization 2: phishing scams use legitimate looking email messages to con a user into giving up private info.

Select whats true about passwords

1: Use a combination of letters, symbols, and numbers. The more characters you use, the more secure your password will be. 2: regularly check your accounts to ensure they have not been tampered with.

Select what is true about passwords

1: passwords can be used to secure computers, networks, software, personal accounts, and digital devices. 2: the terms passcode and key are synonymous for password 3:keys are often generated by encryption software of by the vendor who produced the software

Sometimes used in smaller business networks employee________software is impractical for a large network's because the number of users and the potential for miss use

Monitoring

While you sometimes find this used in similar business networks, employee _______ monitoring software is impractical for large networks because of the number of users and the potential for misuse.

Monitoring

Stored on a users hard drive, cookies that collect information about user preferences, password and username information, IP addresses, and data on web surfing behavior are referred to as

Persistent

A type of phishing that seeks to obtain personal information through the use of fraudulent websites is called

Pharming

The illegitimate use of an email message that is sent to collect personal info and appears to be from an established organization such as a bank, financial institution, or insurance company is called

Phishing

The illegitimate use of an email message that is sent to collect personal information and appears to be from an established organization such as a bank,financial institution, or insurance company is called...

Phishing

Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file it will send he file to an isolated area on the hard disk called

Quarentine

Select whats true about trojan malware

Trojans are often found attached to free downloads and apps Trojans are often used to find passwords, destroy data, or to bypass firewalls Trojans are similar to viruses, but do not replicate themselves

If your debit card is fraudulently used to make a purchase there is no guarantee that your money will ever be replaced. This is especially true if you wait too long to report the fraud.

True

Which of the following are considered social engineering

Using fishing tactics to try in a teen credit card information. 2: using a personal relationship to gain unauthorized access to a network

Software that infects computers and is created using computer code is called a computer...

Virus

Select the answer the best finishes the sentence; the standard for wireless network privacy and protection is known as

WPA2


Conjuntos de estudio relacionados

Which of the following is a difference between communism and socialism as described by the text?

View Set

Chapter 12 Postpartum Physiological Assessments and Nursing Care

View Set

Crime Scene Investigation - Chapter 8 - Note Taking (Documentation)

View Set

A+ Core 1 Exam Practice Questions

View Set

Ch 26 PrepU: Nursing Care of a Family with a High-Risk Newborn

View Set

SaFe Agile Advanced Scrum Master Exam

View Set

Policy provisions and contract law QUIZ

View Set