Bcis Module 6 practice quiz
How is a worm different from a Trojan?
A worm spreads through a network, whereas a Trojan hides inside another program.
Which is a first step to deter thieves from accessing your financial information?
Do not provide personal information over the phone or through email.
In which of the following real-life situations would it be useful to use a digital certificate?
If you were signing a rental lease
How does encryption work?
It scrambles the information until the key is used to unscramble it.
Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?
Ransomware
You can monitor and protect your financial data in all of the following ways EXCEPT(fill in the blank here)
Requesting a credit report and freezing your credit
How is the environment impacted by computers being thrown away in landfills? .
The lead and mercury is seeping into the ground and water supply.
Which of the following is a characteristic of a strong password?
letters numbers and symbols
You can configure your wireless router to protect your devices in all of the following ways EXCEPT (fill in the blank here)
naming your router something you'll remember, like your street address
With more and more people using technology, what physical health diagnosis is on the rise?
repetitive strain injury