Cyber security Unit 2 Review

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following represents an example of a special character? 0 & G s

&

White Hat Hacking

A computer security specialist who breaks into protected systems and networks to test and assess their security.

Which of the following people can access your digital footprint? A. Teachers, colleges, and scholarship committees B. Potential employers C. Family, friends, and acquaintances A only A and B only C only A,B, and C

A, B, and C

Anne Smith is creating a screen name for her video game account. To ensure personal safety, which is the best screen name choice of the following? Her personal information is as follows: Name: Anne Smith Birthday: 12/13/2001 Address: 465 Marbury Lane, Chicago, IL 60603 ASmith2001 AnnieSGamer121301 AnneS60603 ASGamer12 ASChicago01

ASGamer12

Black Hat Hacking

Attempting to find computer security vulnerabilities and exploit them for personal/financial gain or other malicious reasons.

Which instances are considered illegal hacking? A. White hat hacking B. Hacktivism C. Penetration testing D. Bug bounty program E. Hacking just for fun All choices shown are illegal. B, C, D, and E B and E C, D, and E

B and E

What should you do if you are a victim of cyberbullying? A. Respond to the bully B. Keep a record of messages received (print or take screenshots) C. Reach out to parents, teachers, counselors, and school administrators D. Block communication from the bully (if possible) A only A, B, C and D B, C, and D B and C

B, C, and D

You purchased a new smartphone that can accept a PIN of up to six characters. For maximum security, what should you do? Use a four character PIN because it's easier to remember. Change your PIN to a new six-character PIN. Repeat the last character of your old four-character PIN to create a new six-character PIN. Disable encryption.

Change your PIN to a new six-character PIN.

By checking the box on a privacy policy page, a company can legally use your data and information in all the ways disclosed, even if you change your settings. True. This is always the case. True. Changing your settings does not affect privacy policy. False. It depends if the privacy policy allows you to opt-in or out of sharing data. False. Companies do not give you the option to update your settings.

False. It depends if the privacy policy allows you to opt in or out of sharing data.

Which of the following pieces of information would be safe to include in an online username? School mascot Favorite sport Year of birth City of residence

Favorite sport

Data Privacy

How a company uses your data.

Privacy Policy

Legal document outlining how a company can collect and use your data.

You have asked your users to avoid using passwords that use letters only. Which of the following policies would help enforce this? Password complexity requirements Enforce password history Minimum password length Maximum password age.

Password complexity requirements

Data Security

Protecting your data online.

A person's digital footprint is: Public, but not usually permanent Only public to people whom a person shares things with, but what's there is permanent Public and permanent to anyone Not permanent if you are under the age of 18

Public and permanent to anyone

https

Secure data transfer protocol when on the internet.

Digital Footprint

The information about a particular person that exists on the Internet as a result of their online activity.

Cyberbullying

The use of electronic communication to bully a person.

What is not true of white hat hackers? They contribute to robust security systems They use the same methods as black hat hackers They alert companies of security vulnerabilities They are breaking the law and are at risk of legal repercussions

They are breaking the law and are at risk of legal repercussions

How can you be an upstander if you witness cyberbullying? Reach out to the victim and let them know that you care and encourage them to seek help. Tell a teacher, parent, or counselor about the bullying. Report bullying to the website admin. All of these.

all of these

It's time to change passwords again and you don't feel like entering a brand-new password. You use an old password you used last year, but it is rejected. What policy is most likely preventing you from reusing it? Password complexity Password history Password expiration Maximum attempts

password history


Ensembles d'études connexes

Chapter 7: Attitudes and Attitude Change

View Set

Computer Programming FINAL Exam preparation

View Set

Business Strategy: Differentiation, Cost Leadership, and Blue Oceans

View Set

Life Only, Chapter 6 - F. Sales and Marketing of Life and Annuities

View Set