Bcis Module 6 practice quiz

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

How is a worm different from a Trojan?

A worm spreads through a network, whereas a Trojan hides inside another program.

Which is a first step to deter thieves from accessing your financial information?

Do not provide personal information over the phone or through email.

In which of the following real-life situations would it be useful to use a digital certificate?

If you were signing a rental lease

How does encryption work?

It scrambles the information until the key is used to unscramble it.

Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?

Ransomware

You can monitor and protect your financial data in all of the following ways EXCEPT(fill in the blank here)

Requesting a credit report and freezing your credit

How is the environment impacted by computers being thrown away in landfills? .

The lead and mercury is seeping into the ground and water supply.

Which of the following is a characteristic of a strong password?

letters numbers and symbols

You can configure your wireless router to protect your devices in all of the following ways EXCEPT (fill in the blank here)

naming your router something you'll remember, like your street address

With more and more people using technology, what physical health diagnosis is on the rise?

repetitive strain injury


Set pelajaran terkait

unit 1 -Introduction to C program part 1

View Set

FINAL!!!!!!!!!! labor and deliver

View Set

CHEM 3375 Learning Curves Chapters: 1,2,3,4,5,6,7,10

View Set

CompTIA Security+ Final Assessment

View Set