Module 6 BCIS 2610
How is a worm different from a Trojan?
A worm spreads through a network, whereas a Trojan hides inside another program.
How can you protect your information when using social media?
Accept friend requests from people you want to be friends with.
What would a password manager allow you to do?
Create and store multiple strong passwords
Which is a first step to deter thieves from accessing your financial information?
Do not provide personal information over the phone or through email.
Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?
Ergonomics
How does encryption work?
It scrambles the information until the key is used to unscramble it.
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?
Phishing
What is a digital certificate?
Technology used to verify a user's identity
In which of the following real-life situations would it be useful to use a digital certificate?
if you were signing a rental lease
Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?
A Trojan