Chapter 06 Security and Safety Quiz

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Reggie works for a health insurance company and spends many hours each day entering data into a database. Recently he complained to his doctor about pain and stiffness in his neck and shoulders. Which of the following is his doctor most likely to recommend? a. Take more frequent brakes. b. Quit his job and work from home. c. Move his desk closer to a window. d. Ask for different job responsibilities.

a. Take more frequent brakes.

Remy is on a business trip with coworkers. One evening, they all go out for dinner. As Remy is about to post photos of the group on Facebook, a coworker suggests that might not be a good idea. Which of the following is the most legitimate security reason for not posting the photos? a. Potential customers might think the company is irresponsible with money. b. Potential burglars could find out Remy and his friends are out of town. c. Some members of the group might be embarrassed to have their photo taken. d. The group's boss wouldn't approve of their having a good time.

b. Potential burglars could find out Remy and his friends are out of town.

Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely? a. Ergonomics b. Cyberbullying c. Technology addiction d. Repetitive strain

a. Ergonomics

After shopping for a used Jeep, Nichole starts noticing a lot of ads on her Instagram feed for Jeeps. How did Instagram know she's interested in buying a Jeep? a. Virus on her computer b. Cookies on her computer c. Pop-ups in her browser d. Extensions in her browser

b. Cookies on her computer

Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening? a. A hacker is trying to put a Trojan on her computer. b. It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer. c. A worm has infected her computer and she needs to unplug her device. d. Nothing has happened and the message is fine to ignore since she has not been home all day and her computer has not been turned on until now.

b. It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.

The term CAPTCHA is _____________. a. a private combination of words associated with a user name that allows access to computer resources b. the average time it takes a computer to discover a password based on the number of characters c. a series of distorted characters that a user is required to enter correctly to continue using a website d. a digital image used to help decipher a faded or blurry word in digitized news archives

c. a series of distorted characters that a user is required to enter correctly to continue using a website

You can monitor and protect your financial data in all of the following ways EXCEPT _____. a. Shredding financial documents before you discard them. b. Being cautious about what information you post on social networking sites. c. Querying unfamiliar purchases found on your bank statements. d. Answer Storing financial information in an unsent email message.

Answer Storing financial information in an unsent email message.

How is a worm different from a Trojan? a. A worm spreads through a network, whereas a Trojan hides inside another program. b. A worm prevents a device from functioning until a ransom is paid, whereas a Trojan gathers information and transmits it to another device. c. A worm gathers information and transmits to a server, whereas a Trojan hides and then spreads through a network. d. A worm reproduces itself on the same computer, whereas a Trojan attempts to spread through the network.

a. A worm spreads through a network, whereas a Trojan hides inside another program.

_____ ensures that the person requesting access to a computer is not an imposter. a. Authentication b. Encryption c. Data mining d. Automatic encoding

a. Authentication

Lyle is working online when a message appears warning that his personal files have been encrypted so he cannot access them. He has 72 hours to pay hundreds of dollars to receive a key to decrypt the files. What type of malware is infecting Lyle's computer? a. Ransomware b. Address spoofer c. Trojan d. Social engineering

a. Ransomware

Why is it not safe to connect to public Wi-Fi networks? a. Because the connection is often too slow b. Because these networks are rarely protected c. Because they do not allow Internet access d. Because it can weaken your own Wi-Fi wireless router

b. Because these networks are rarely protected

How can you protect a computer from electrical spikes and surges? a. Unplug the computer when it is not in use. b. Use a surge protector. c. Use a cable lock. d. Use an uninterruptible power supply

b. Use a surge protector.

What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank? a. identity theft b. phishing c. dumpster diving d. encryption

b. phishing

When you access a secure website, what information does your browser use to verify that web server's identity and encryption information? a. Password b. Encryption key c. Digital certificate d. TIN (tax identification number

c. Digital certificate

Which of the following is the strongest password? a. Welcome123 b. colorbluesky c. H@veAGr3atDaY! d. Test1test2test3

c. H@veAGr3atDaY!

Malware is short for ______ software. a. malevolent b. malignant c. malicious d. malady

c. malicious

Pierre received an urgent email appearing to come from his boss asking him to respond quickly to the email with the company credit card number so she can pay for a business meal for her new clients. What kind of email is this? a. Hoax b. Spam c. Phishing d. Ransomware

c. phishing

With more and more people using technology, what physical health diagnosis is on the rise? a. technology addiction b. cyberbullying c. repetitive strain injury d. cyberstalking

c. repetitive strain injury

Gabe is clearing out his wallet because it has become too bulky. Which of the following items should he remove from his wallet permanently for security reasons? a. Driver's license b. Cash c. Credit card d. Social Security card

d. Social Security card

Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability? a. technical terrorism b. information liability c. network compromise d. digital security risk

d. digital security risk


Set pelajaran terkait

HS Energy/Electricity/Magnetism Review

View Set

8.20.T - Lesson: Molecular Formulas & Hydrates Assessment

View Set

MCAT Biology Questions & Concepts

View Set