Online Safety and Security: 1.4.19 Concept Questions

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What are the two main types of firewall? (select two)

- Host-based Firewall - Network Firewall Explanation There are two kinds of firewalls: Network firewalls, which protect an entire network, and host-based firewalls, which protect a single computer.

The process of proving to the computer that you are who you say you are is called ____________.

Authentication Explanation Authentication is the process of proving to the computer that you are who you say you are. Common methods of identification include passwords, keycards, and fingerprint scans.

Web browsers save website information in their _________, which helps the site load faster on future visits.

Cache Explanation The browser cache is a repository of temporary files which help websites load faster once they've already been visited.

Small files that a website saves on your computer to remember your preferences are called ______________.

Cookies Explanation Cookies are small files that a website saves on your computer to remember your preferences. Cookies are also small sweet cakes that are typically round and can be eaten with milk.

Why is it better to use a credit card than a debit card for online purchases?

Credit cards have better fraud protection Explanation Credit cards have superior fraud protection compared to debit cards. If someone steals your credit card info, the card issuer will often be able to cancel any fraudulent charges made in your name. That said, credit cards have extremely high interest rates, and should be aggressively paid off in full every month.

Which of the following would best prevent an unauthorized person from remotely accessing your computer?

Firewall Explanation Firewalls prevent unauthorized parties from accessing information on your computer.

Which Internet protocol is used to transmit encrypted data?

HTTPS Explanation Of all the protocols on this list, only HTTPS encrypts data before sending it.

Which kind of online attack involves pretending to be a legitimate company to get sensitive information?

Phishing Explanation Phishing attacks create real-looking webpages and forms to trick users into giving away their personal information. Viruses and spyware are malicious computer programs that either steal private information or infect your computer.

Unwanted, unsolicited emails containing advertisements, political rhetoric, hoaxes, or scams are collectively known as _________.

Spam Explanation Spam is the name given to all unwanted mass emails.

Which software is Microsoft's anti-malware product that is preinstalled on most new computers?

Windows Defender Explanation Windows Defender is an antimalware program created by Microsoft and automatically installed on many versions of Windows. The other three programs are created by other companies, and must be purchased before they can be used.


संबंधित स्टडी सेट्स

behavior, Attitude, and Work Ethics

View Set

Intro to Architecture Module 10c- Other Modernisms: Louis Kahn

View Set

ATI TEAS 7 - English & Language Usage 3

View Set

Chapter 9 - Competition and Monopolies

View Set