ITE 115 Exam 2
_____ ensures that the person requesting access to a computer is not an imposter.
Authentication The following components would create a strong authentication security plan: Use a password manager to create strong password; use biometrics to identify the individuals logging into the system; and use two-factor authentication where the individual first enters their password and then is sent a code to another device in their possession that they then also enter.
Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?
Trojan A computer Trojan is a malware that hides inside another program, often downloaded from the web. It "masquerades" as performing a safe activity but instead does something malicious.
How will you decide which browser security settings to allow and which ones to block?
I will need to review each browser security setting and use my best judgement. Each setting will need to be evaluated and you will need to use your best judgement to decide if you should allow or deny the request to access your computer.
With more and more people using technology, what physical health diagnosis is on the rise?
repetitive strain injury Many users of technology report aches and pains associated with repeated and long-term usage of the devices, known as repetitive strain injury. It impacts your muscles, nerves, tendons, and ligaments.
Cassidy is a medical assistant in a hospital and has access to many medical files. When she brings patients to the examining room, she can be observed swiping a card, typing in a password, and staring into what appears to be a camera, all attached to the computer. After completing her check-in, Cassidy leaves the patient in the examining room waiting on the doctor. It is important that she logs out of the system so the patient does not have access to the information stored in the hospital's database. Based on Cassidy's actions what systems do you think the hospital has in place to protect the patient medical records?
Biometrics The hospital has invested in biometric security, which uses the unique characteristics of the employee's face, hands, or eyes to identify them, so a patient would be locked out. The two-factor authentication system sends a code to a device on the person after they have entered their first password, in this case, her swipe card.
What would a password manager allow you to do?
Create and store multiple strong passwords. With a password manager, you can create and store multiple strong passwords in single user "vault" file that is protected by one strong master password. You can then retrieve individual passwords as needed from the vault, freeing you from the need to memorize passwords.
What is a digital certificate?
Technology used to verify a user's identity A digital certificate is a technology used to verify a user's identity and key that has been "signed" by a trusted third party.
How can an attacker execute malware through a script?
A script can run a series of instructions to download and run malware. An add-on might allow your computer to download a "script" or series of instructions that commands the browser to perform specific actions. An attacker could exploit a security weakness in the add-on to download and execute malware on the user's computer.
How is a worm different from a Trojan?
A worm spreads through a network, whereas a Trojan hides inside another program. A worm is a malicious program that attempts to spread. A Trojan is malware that hides inside another program and when it is installed, it gathers information and transmits it to the attacker.
Why is it not safe to connect to public Wi-Fi networks?
Because these networks are rarely protected When using a public Wi-Fi network, there are safety concerns. First, these networks are rarely protected. Second, an attacker may have setup an evil twin to mimic an authorized device.
Which is a first step to deter thieves from accessing your financial information?
Do not provide personal information over the phone or through email. The first step to deter thieves by safeguarding information is to not provide personal information either over the phone or through an email message.
Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?
Ergonomics Ergonomics is an applied science that specifies the design and arrangement of items that you use, such as posture techniques, so that you and items interact efficiently and safely.
Which of the following is the strongest password?
H@veAGr3atDaY! A strong password is a longer combination of letters, number, and/or symbols that unlocks access to electronic data.
Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one?
He can use remote tracking to retrace the thief's steps. If a mobile device is lost or stolen, several security features can be used to locate the device or recover it. The device can generate an alarm even if it is on mute. If the battery is charged to less than a specific percentage, the device's last known location can be indicated on an online map. The current location of the device can be pinpointed on a map through the device's GPS. A thief who enters an incorrect passcode three times will have his or her picture taken through the device's on-board camera and emailed to the owner.
How does encryption work?
It scrambles the information until the key is used to unscramble it. Encryption is the process of "scrambling" information in such a way that it cannot be read unless the user possesses the "key" to unlock it back to a readable format.
In terms of privacy, which of the following is a best practice?
Keeping your Social Security number hidden in a locked box in your home One privacy best practice is to not carry your social security number in your wallet or write it on a check.
How does discarding computers in a landfill affect the environment?
Lead and mercury in computer parts are seeping into the ground and water supply. Computer parts contain valuable materials such as gold, palladium, platinum, and copper. However, they also contain other metals that are toxic, such as lead and mercury.
Module 6
Module 6
You can monitor and protect your financial data in all of the following ways EXCEPT _____.
Storing financial information in an unsent email message. There are laws to help U.S. users monitor and protect their financial information that is stored by a credit reporting agency. You can request one free credit report annually and you can also "freeze" your credit information.
In which of the following situations is a digital certificate useful?
You are signing a rental lease. A digital certificate is a technology used to verify a user's identity and key that has been "signed" by a trusted third party.
Which of the following statements about browser security settings is false?
You must keep your accumulated web history as long as you use the browser. You can either block all pop-ups or accept all pop-ups, and even selectively choose which sites to run pop-ups. Cookies can be accepted or denied. Sites can be allowed or blocked from running scripts.
Creating a(n) _____ means copying files from a computer's hard drive and storing them in a remote location.
data backup Creating a data backup means copying files from a computer's hard drive that are then stored in a remote location. Data backups can save your information from hardware malfunctions, user error, software corruption, and natural disasters.
You can configure your wireless router to protect your devices in all of the following ways EXCEPT ____.
naming your router something you'll remember, like your street address The wireless router acts a "base station" for the wireless devices, sending and receiving wireless signals between all devices as well as providing the "gateway" to the external Internet.
Which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information?
pretexting Some of the actions that can be undertaken by identity thieves include: File for bankruptcy under the person's name. Go on spending sprees. Open a bank account in the person's name. Obtain loans for expensive items such as cars.
How can you protect a computer from electrical spikes and surges?
Use a surge protector. A surge protector can defend computer equipment from spikes, surges, and noise. A surge protector lies between the computer and the electrical outlet and absorbs any electrical change so that it does not reach the computer equipment.
Which of the following types of websites typically provides the least security?
social media sites Although attackers for various hacks could use any answer, the online attacker looking to steal your identity would typically use your posts to figure out answers to possible security questions.