module 6 Test Study Guide

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

How does the discarding of old computer in a landfill have an effect on the environment?

- It increases the need for more and larger landfill sites - old computer parts contain toxic metals (lead and mercury) that lead to a contaminate ground and water supply

How can a person protect personal info collected by legitimate institutions?

- give only necessary information - review the info online sites have stored about you - request to be removed from mailing list - create a separate email only for a merchant or website that requires an address - Never use your social media account login info to login to another site

What are attack risk on a Wi-Fi Network?

- reading wireless transmissions (ex. usernames, passwords, and credit card numbers) - viewing or stealing computer data - injecting malware downloading harmful content

Identify in regards to privacy, which is best practice.

- shred financial documents and paperwork that may contain personal information - don't carry a social security number in wallet and never write it down on a check - don't provide personal info either over phone or email - keep personal info in a secure location (ex. home or apartment) - Be cautious about the info you post on social media - keep only the last 3 months of your recent financial statement and shred older documents be cautious when giving permission to a website or app to collect info - use common sense

How is the system of biometrics used in a hospital settings?

Biometrics security used people's unique characteristics of your face such as your Retina, fingerprint, voice, face, and iris

How can a person protect a computer from electrical surges?

By using a surge protector

Data backup

Copying files from a computer's hard drive that are then stored in a remote location

How can a hacker execute malware using a script?

Could exploit a security weakness in the add-on to download and execute malware on the user's computer

True or False: "Social networking sites have a history of providing tight security and giving users a clear understanding of how security features work".

False

True or False: "To protect your information and to help you to remember passwords, use your social media account login information to log into another site".

False

True or False: "Trojan is a malicious program that uses a computer network to replicate".

False Worms is a malicious program that uses a computer network to replicate

True or False: "To prevent a laptop from being stolen, you can use a surge protector."

False, you would use a cable lock

What is it called, when an attacker convinces you to enter in personal info at a fake website after receiving an email from a person pretending to be a bank employee?

Phishing

A Cyberbullying example would be

Posting, sending, or sharing negative, harmful, mean-spirited, and majority of the time false information of another person

digital certificate

Technology used to verify a user's identity and key that has been "signed" by a trusted third party

How does Encryption work?

The process of "scrambling" information in a way that cannot be read unless the user possesses the "key" to unlock it back to a readable format (decryption)

Difference between Trojan and Worm

Worm: a malicious program that uses a computer network to replicate Trojan: malware that hides inside another program, often one downloaded from the web

Identify situation in which a digital certificate is useful.

allows third party to verify the owner and if the key belongs to that owner

Identify what a browser security setting allow and which do not.

review each browser security setting and use my best judgment

Identify to what technology can lead to EXCEPT

technology addiction


संबंधित स्टडी सेट्स

Chapter 19 - Nursing Care of the Family During the Postpartum Period - Test 1

View Set

Lifespan Dev-School&Family Influences

View Set

International Relations Quiz + Midterm Chapter 2

View Set

Ch 17: Staffing Needs and Scheduling Policies

View Set

Chapter 65: Assessment of Neurologic Function

View Set

ch 28 Chronic Stable Angina and Low-Risk Unstable Angina

View Set