ITE 115 - module 4

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Social-networking sites have a history of providing tight security and giving users a clear understanding of how security features work.

false -- Social-networking sites have a history of providing lax security, of not giving users a clear understanding of how security features work, and of changing security options with little or no warning.

Which of the following is a characteristic of a strong password?

letters, numbers, and symbols -- A strong password is a longer secret combination of letters, number, and/or symbols that unlocks access to protected electronic data. It A longer password is always more secure than a shorter password.

Alexis changed a few default settings on a program she was using on her computer. Afterward, however, she did not like the results and preferred to get it back to default settings. Unfortunately, Alexis does not remember exactly what she changed. Which of the following types of tools could help her in this scenario?

restorers -- Restorers allow users to restore the computer or software settings. These are helpful if an update seems to have caused issues with the system or a specific program.

How can an attacker execute malware through a script?

A script can run a series of instructions to download and run malware. -- An add-on might allow your computer to download a "script" or series of instructions that commands the browser to perform specific actions. An attacker could exploit a security weakness in the add-on to download and execute malware on the user's computer.

In which phase of the SDLC is the feasibility study done to determine if the project is worth pursuing?

Analysis phase -- The analysis phase consists of two major components: conducting a preliminary investigation and performing a detailed analysis. The preliminary investigation sometimes is called a feasibility study. The goal of this part of the phase is to determine if the project is worth pursuing.

The news reports a security breach of credit card information at a large department store that has recently laid off many employees. Why should the store investigate the possibility of the breach being from an insider?

Because insiders sometimes create threats after incidents at their places of employment -- Insiders are employees, contractors, and business partners who pose a security threat especially when they are upset about being passed over for a promotion or not getting a contract.

Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one?

He can use remote tracking to retrace the thief's steps. -- If a mobile device is lost or stolen, several security features can be used to locate the device or recover it. The device can generate an alarm even if it is on mute. If the battery is charged to less than a specific percentage, the device's last known location can be indicated on an online map.

How will you decide which browser security settings to allow and which ones to block?

I will need to review each browser security setting and use my best judgement. -- Each setting will need to be evaluated and you will need to use your best judgement to decide if you should allow or deny the request to access your computer.

Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening?

It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer. -- Ransomware prevents a user's device from properly and fully functioning until a fee is paid. Most likely, if she called the number, they would try to connect to her computer and then place ransomware software on her computer.

A banking app requires stringent access control measures for security reasons. Which of the following techniques could be used to define who can use the app and what actions they can perform?

Require users to identify themselves using biometrics or passwords. -- Access controls are security measures that define who can use a program or app, and what actions they can do within the program or app by requiring users to verify themselves using passwords, biometrics, or other identifying techniques.

Which of the following statements about browser security settings is false?

You must keep your accumulated web history as long as you use the browser. -- You can either block all pop-ups or accept all pop-ups, and even selectively choose which sites to run pop-ups. Cookies can be accepted or denied. Sites can be allowed or blocked from running scripts.

After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________.

cyberbullying -- includes sending, posting, or sharing negative, harmful, mean-spirited, and usually false content about another person.

Creating a(n) _____ means copying files from a computer's hard drive and storing them in a remote location.

data backup -- Creating a data backup means copying files from a computer's hard drive that are then stored in a remote location. Data backups can save your information from hardware malfunctions, user error, software corruption, and natural disasters.

Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?

ergonomics -- an applied science that specifies the design and arrangement of items that you use, such as posture techniques, so that you and items interact efficiently and safely.

Technology can lead to all of the following behavioral risks EXCEPT _____.

higher satisfaction with life -- In addition to technology addiction, there are other behavioral risks associated with using technology: a sedentary lifestyle; poor psychological development, including anxiety, depression, and lower life satisfaction; and poor social interactions, such as social withdrawal.

Che contracted with a software development team to create a program for his company. He wants to review the budget and schedule for the project every week. Which project team member should he contact for this information?

project manager -- a person dedicated to coordinating project components and ensuring that each member is progressing as planned. This person oversees the product's team, budget, and schedule and reports into the development company's management.

What do you call the rules each programming language has for writing instructions?

syntax -- Firewall software creates a personal security zone around your computer by monitoring all incoming and outgoing traffic and blocking suspicious activity.

Why is it not safe to connect to public Wi-Fi networks?

Because these networks are rarely protected -- When using a public Wi-Fi network, there are safety concerns. First, these networks are rarely protected. Second, an attacker may have setup an evil twin to mimic an authorized device.

Is it advisable to enable automatic updates on security software?

Yes; this helps to catch and quarantine new malware before it harms the computer. -- You should enable automatic updates to your security software to catch any new viruses or malware that have been identified.

Meredith was using a spreadsheet app when it stopped responding and closed unexpectedly. What happened to the app?

a crash -- Most computers and devices come with some preinstalled programs and apps that already are on the machine. Most important is the system software such as the operating system, which allows to use the computer or device when turned on the first time.

__________________ refers to unique and original works, such as ideas, inventions, art, writings, processes, company and product names, and logos.

intellectual property -- Programs and apps are considered the intellectual property of the creator(s). Intellectual property (IP) refers to unique and original works, such as ideas, inventions, art, writings, processes, company and product names, and logos.

Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?

trojan -- A computer Trojan is a malware that hides inside another program, often downloaded from the web. It "masquerades" as performing a safe activity but instead does something malicious.

Assembly languages are the second generation of languages that use symbolic instruction codes, such as A for add, M for multiply, and L for load.

true -- Assembly languages are one of two types of low-level programming languages and are difficult to learn. With an assembly language, the programmer uses symbolic instruction codes.

Siobhan has recently opened a Facebook account and as a new user, is posting frequently and accepting many friend requests. You see a post about an upcoming trip and notice that her profile is open to the public. What can you tell Siobhan to help her use social networking safely?

Be cautious about what information she posts. -- Several general defenses can be used for any social-networking site. First and foremost, be cautious about what information you post. Second, be cautious about who can view your information. Consider carefully who you accept as friends. Finally, review the site's security settings.

How can you protect personal information gathered by legitimate organizations?

Create a separate email account for receiving information from websites. -- Attackers often pose as friends you may have known in school or met and ask to be "friends" to get at your personal information. Accept requests from only those whom you want to have access to your information.

Cassidy is a medical assistant in a hospital and has access to many medical files. When she brings patients to the examining room, she can be observed swiping a card, typing in a password, and staring into what appears to be a camera, all attached to the computer. After completing her check-in, Cassidy leaves the patient in the examining room waiting on the doctor. It is important that she logs out of the system so the patient does not have access to the information stored in the hospital's database. Based on Cassidy's actions what systems do you think the hospital has in place to protect the patient medical records?

biometrics -- The hospital has invested in biometric security, which uses the unique characteristics of the employee's face, hands, or eyes to identify them, so a patient would be locked out. The two-factor authentication system sends a code to a device on the person after they have entered their first password, in this case, her swipe card.

To prevent a laptop from being stolen, you can use a surge protector.

false -- To prevent laptops from being stolen, you can use a cable lock.

What would a password manager allow you to do?

Create and store multiple strong passwords. -- With a password manager, you can create and store multiple strong passwords in single user "vault" file that is protected by one strong master password. You can then retrieve individual passwords as needed from the vault, freeing you from the need to memorize passwords.

If a software app is identified with a critical error after release, the development team can release a patch to address this single issue only.

true -- updates that address a single issue are called patches


Ensembles d'études connexes

Care of Patients with Problems of the CNS: Brain

View Set

Saunders questions Mr. Keene exam 2 "med emergency"

View Set

Unit 4 | Fraction ↔ Decimal ↔ Percent (with Models)

View Set

Net260.30 Linux Administration Chapter 9

View Set

Chapter 2: The Chemical Context of Life (Multiple-Choice Questions), A.P. Biology Water Quiz, TEST PREP: Chapter 5; The Structure and Function of Large Biological Molecules, Campbell Biology; Tenth Edition, AP Biology Chapter 6 Multiple Choice

View Set