DD-Module 6 Computer Concepts PRACTICE Quiz

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following is a characteristic of a strong password? (516081)

C:letters, numbers, and symbols

In terms of privacy, which of the following is a best practice? (516079)

B:Keeping your Social Security number hidden in a locked box in your home

What is a digital certificate? (516086)

B:Technology used to verify a user's identity

With more and more people using technology, what physical health diagnosis is on the rise? (516097)

C: repetitive strain injury

Technology can lead to all of the following behavioral risks EXCEPT _____. (516071)

D:higher satisfaction with life

Which is a first step to deter thieves from accessing your financial information? (516103)

A:Do not provide personal information over the phone or through email.

How does encryption work? (516084)

A:It scrambles the information until the key is used to unscramble it.

How can you protect a computer from electrical spikes and surges? (516076)

A:Use a surge protector.

What would a password manager allow you to do? (516101)

B:Create and store multiple strong passwords.

Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one? (516078)

B:He can use remote wiping to retrace the thief's steps.

How is a worm different from a Trojan? (516098)

C:A worm spreads through a network, whereas a Trojan hides inside another program.

There are various risks from attacks on Wi-Fi networks. These include all of the following EXCEPT _____. (516080)

D: creating malware

How can you protect your information when using social media? (516069)

D:Accept friend requests from people you want to be friends with.

A Trojan is a malicious program that uses a computer network to replicate. (516075)

False

To prevent a laptop from being stolen, you can use a timelock device. (516077)

False

Your Facebook profile is private so there is no need to worry about your boss ever seeing your posts such as your Spring Break pictures. (516092)

False

Siobhan has recently opened a Facebook account and as a new user, is posting frequently and accepting many friend requests. You see a post about an upcoming trip and also notice that her profile is open to the public. How can you help Siobhan navigate this new world of social-networking? Select all that apply. (516104)

Tell her to be cautious about what information she posts., Show her how to view the security settings., Show her what information the people she has accepted as friends can view.

You have been asked to create an authentication security plan for your company. Which of the following components would you incorporate to ensure your company is secured? Select all that apply. (516083)

Use biometric security that uses characteristics of your face, hands, or eyes., Use two factor authentication where the user enters the password and a code sent his or her cell phone., Use a password manager to create unique strong passwords.

Frank thinks he has been a victim of identity theft. Which of the following scenarios might have led him to that conclusion? Select all that apply. (516087)

A new bank account has been opened in his name in a city where he does not live., He found out he owns a new car, but he never actually bought one., There are charges on his credit card for a ski trip in Colorado and he has never been to Colorado., He received a letter from a bankruptcy court regarding his claim that he never filed.

After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________. (516072)

B:cyberbullying

Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening? (516074)

C:It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.

How could an online attacker use your online profile to gather information about you to steal your identity? (516091)

C:Use your posts to figure out answers to possible security questions.

What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank? (516089)

C:phishing

Choose the strongest password. Select all that apply. (516082)

H@veAGr3atDaY!

Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer? (516073)

B:A Trojan


संबंधित स्टडी सेट्स

introduction to applied behavior analysis

View Set

Chapters 53, 54, 55: Renal and Urinary Systems

View Set

Chapter 12: Pulling It All Together - Dietary Guidelines for Americans and Food Labeling

View Set

Patients With Hematologic Disorders- Prep U ch. 20

View Set