Module 6 BCIS 2610

¡Supera tus tareas y exámenes ahora con Quizwiz!

How is a worm different from a Trojan?

A worm spreads through a network, whereas a Trojan hides inside another program.

How can you protect your information when using social media?

Accept friend requests from people you want to be friends with.

What would a password manager allow you to do?

Create and store multiple strong passwords

Which is a first step to deter thieves from accessing your financial information?

Do not provide personal information over the phone or through email.

Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?

Ergonomics

How does encryption work?

It scrambles the information until the key is used to unscramble it.

What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?

Phishing

What is a digital certificate?

Technology used to verify a user's identity

In which of the following real-life situations would it be useful to use a digital certificate?

if you were signing a rental lease

Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?

A Trojan


Conjuntos de estudio relacionados

PRAXIS Elementary Education: Multiple Subjects Mathmatics (5003) Practice Test Questions (form 3)

View Set

Unit 4 - Communications With Customers and Prospects

View Set

Chapter 6 - Values, Ethics and Advocacy

View Set

ATI RN Fundamentals Online Practice 2019 B w. NGN

View Set

Earth A Unit 2 Test Review - Where is Earth?

View Set

Chapter 11: Managing Labor Relations

View Set

Combo with "Completing the Sentence Unit 13 Vocab" and 1 other

View Set

4 - Enhanced Entity..Relationship and UML Modeling

View Set