Ch 6

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What would a password manager allow you to do? a. Create and store multiple strong passwords. b. Test your memorization skills. c. Prevent you from using birthdays in your passwords. d. Make sure you do not repeat passwords on similar accounts.

a

Which is a first step to deter thieves from accessing your financial information? a. Do not provide personal information over the phone or through email. b. Review financial and billing statements each month carefully. c. Follow up on calls regarding purchases that were not made. d. Be alert to signs that may indicate unusual activity in an account.

a

You can monitor and protect your financial data in all of the following ways EXCEPT _____. a. Requesting a credit report and freezing your credit. b. Being cautious about what information you post on social networking sites. c. Throwing financial documents older than three months in the trash. d. Querying unfamiliar purchases found on your bank statements.

a

After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________. a. cyberstalking b. cyberbullying c. social engineering d. data mining

b

Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer? a. A worm b. A Trojan c. Spam d. Ransomware

b

How can you protect a computer from electrical spikes and surges? a. Use a cable lock. b. Use a surge protector. c. Unplug the computer when it is not in use. d. Use an uninterruptible power supply.

b

How is the environment impacted by computers being thrown away in landfills? a. Data miners are digging up landfills looking for gold and platinum. b. The lead and mercury is seeping into the ground and water supply. c. The copper is creating fire dangers and explosive possibilities. d. The e-waste is increasing because more people are choosing to recycle.

b

In terms of privacy, which of the following is a best practice? a. Throwing away old bank statements that are more than three months old b. Keeping your Social Security number hidden in a locked box in your home c. Saving your personal information as an email draft d. Posting your location on social media

b

Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one? a. His phone can generate an alarm even if it is on mute. b. He can use remote wiping to retrace the thief's steps. c. The current location of his phone can be pinpointed on a map through the phone's GPS. d. If the thief enters an incorrect passcode thee times, then a picture of the thief will be taken and emailed to Marcus.

b

Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely? a. Cyberbullying b. Ergonomics c. Technology addiction d. Repetitive strain

b

You are watching the news and learn that there has been a security breach of credit card information at a large department store. The news report also states that the same company has had recent layoffs. The report says that the company is looking into whether or not the breach was done by an insider. Why would the company investigate the possibility of the breach being from an insider? a. Because insiders like to cause disruption and panic among citizens. b. Because insiders create threats after incidents at their places of employment. c. Because insiders change contents to make a political statement. d. Because insiders lack the knowledge of computers and networks to perform this task.

b

You can configure your wireless router to protect your devices in all of the following ways EXCEPT ____. a. creating a strong password to access the router b. naming your router something you'll remember, like your street address c. turning off remote management to the device d. utilizing guest access when needed and turning it off when guests leave

b

How could an online attacker use your online profile to gather information about you to steal your identity? a. Use your profile pictures to figure out where you are. b. Pose as a long lost relative to become one of your friends. c. Use your posts to figure out answers to possible security questions. d. Post a message that appears to be from a friend warning about a security breach and encouraging you to change your account information.

c

How is a worm different from a Trojan? a. A worm reproduces itself on the same computer, whereas a Trojan attempts to spread through the network. b. A worm gathers information and transmits to a server, whereas a Trojan hides and then spreads through a network. c. A worm spreads through a network, whereas a Trojan hides inside another program. d. A worm prevents a device from functioning until a ransom is paid, whereas a Trojan gathers information and transmits it to another device.

c

How will you decide which browser security settings to allow and which ones to block? a. If the browser security setting has been mentioned on several friends' timelines on Facebook then it must be a good one, so I should do change it on my computer too. b. If the browser security setting is on a website sent from a friend, I always accept the setting. c. I will need to review each browser security setting and use my best judgement. d. If the browser security setting is from my favorite online retailers, I will accept it because the retailer knows what I like.

c

In which of the following real-life situations would it be useful to use a digital certificate? a. if you were registering for an event b. if you were submitting a paper to your professor c. if you were signing a rental lease d. if you were emailing a friend

c

What is a digital certificate? a. A growing trend used to combine multiple types of authentication b. The process of scrambling information so that it cannot be read c. Technology used to verify a user's identity d. The key to unlock information into a readable format

c

What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank? a. encryption b. dumpster diving c. phishing d. identity theft

c

Which of the following is a characteristic of a strong password? a. A short phrase b. numbers in a series c. letters, numbers, and symbols d. personal information

c

With more and more people using technology, what physical health diagnosis is on the rise? a. cyberstalking b. cyberbullying c. repetitive strain injury d. technology addiction

c

How can an attacker execute malware through a script? a. An attacker can steal a cookie and impersonate you in a script, thereby infecting someone else's computer. b. An attacker can attach to a plug-in and when you allow the plug-in to run, it infects the website you were visiting. c. An attacker can impersonate a pop-up and when you click on it create a script to spread a Trojan. d. An attacker can attach a script to a program that you download which then infects your computer.

d

There are various risks from attacks on Wi-Fi networks. These include all of the following EXCEPT _____. a. reading wireless transmissions b. viewing or stealing computer data c. downloading harmful content d. creating malware

d


Ensembles d'études connexes

How JS Programs Work & the Execution Context

View Set

Hesi EAQ Quiz: Medical-Surgical Nursing: Respiratory System, Integumentary System, Musculoskeletal

View Set

Fundamentals of Nursing: Chapter 39

View Set

Business Accounting 1-5 Proc.Exam

View Set

Property and Casualty Insurance Terms & Related Concepts

View Set

RPAS Foundations and Remote Vehicles Summative

View Set

Ultrasound physics Chapter 3 review

View Set