MIS quiz H and I for exam 4
to ensure you have a proper password, which of the following rules should you follow? -create a password 12-15 characters in length -change your password frequently (every months) -keep it weird -use your password on multiple sites
-create a password 12-15 characters in length -keep it weird
which components of a computer are at its core and determine how "good" it is
CPU, cache, RAM
utilizing the password rules, which of the following passwords are the strongest? -BoomerSooner -RedHatPonyHi -P@$$w0rd -123456789
RedHatPonyHi
_________ store files on your computer that enable companies to track your web viewing and target specific ads at you
cookies
what is the fastest and cheapest way to make your computer faster
increase RAM
which of the following is not an OUTPUT for a computer: -mouse -printer -screen
mouse
for the following scenario, indicate the proper people/process/technology and the corresponding CIA term: a spear phishing attempt designed to steal personal information and sell it on the black market
people/confidentiality
software updates, encryption backup, and redundancy are examples of
preventing attacks on technology
which of the following is not an INPUT for a computer: -printer -mouse -keyboard -touchscreen
printer
for the following scenario, indicate the proper people/process/technology and the corresponding CIA term: a policy requiring all data to be verified for accuracy
process/integrity
an attack targeted at an individual is a
spear phishing attack
for the following scenario, indicate the proper people/process/technology and the corresponding CIA term: a zero day exploit used to shut down a nuclear power plant
technology/availability