ITE115 Module 04: Security and Safety Quiz

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

With more and more people using technology, what physical health diagnosis is on the rise? technology addiction cyberstalking cyberbullying repetitive strain injury

repetitive strain injury

Siobhan has recently opened a Facebook account and as a new user, is posting frequently and accepting many friend requests. You see a post about an upcoming trip and notice that her profile is open to the public. What can you tell Siobhan to help her use social networking safely? Post all types of photos more often. Ignore notices from the social networking site about changes to security. Be cautious about what information she posts. Allow anyone who "friends" her to view her information.

Be cautious about what information she posts.

Creating a(n) _____ means copying files from a computer's hard drive and storing them in a remote location. data backup uninterruptible data supply private copy alarm

data backup

The news reports a security breach of credit card information at a large department store that has recently laid off many employees. Why should the store investigate the possibility of the breach being from an insider? a. Because insiders often like to cause disruption and panic among citizens b. Because insiders need practice breaking into networks c. Because insiders like to breach security to make a political statement d. Because insiders sometimes create threats after incidents at their places of employment

d. Because insiders sometimes create threats after incidents at their places of employment

Which of the following is a characteristic of a strong password? personal information numbers in a series A short phrase letters, numbers, and symbols

letters, numbers, and symbols

Your Facebook profile is private so there is no need to worry about your boss ever seeing your posts such as your Spring Break pictures. False True

False

What is a digital certificate? A growing trend used to combine multiple types of authentication The process of scrambling information so that it cannot be read Technology used to verify a user's identity The key to unlock information into a readable format

Technology used to verify a user's identity

What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank? encryption identity theft dumpster diving phishing

phishing

Which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information? cyberstalking phishing research spoofing pretexting

pretexting

_____ ensures that the person requesting access to a computer is not an imposter. Automatic encoding Encryption Authentication Data mining

Authentication

Social-networking sites have a history of providing tight security and giving users a clear understanding of how security features work. False True

False; Social-networking sites have a history of providing lax security, of not giving users a clear understanding of how security features work, and of changing security options with little or no warning.

To prevent a laptop from being stolen, you can use a surge protector. True False

False; To prevent laptops from being stolen, you can use a cable lock.

Which of the following is the strongest password? Welcome123 Test1test2test3 H@veAGr3atDaY! colorbluesky

H@veAGr3atDaY!

Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening? a. A hacker is trying to put a Trojan on her computer. b. A worm has infected her computer and she needs to unplug her device. c. It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer. d. Nothing has happened and the message is fine to ignore since she has not been home all day and her computer has not been turned on until now.

c. It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.

What would a password manager allow you to do? Test your memorization skills. Create and store multiple strong passwords. Prevent you from using birthdays in your passwords. Make sure you do not repeat passwords on similar accounts.

Create and store multiple strong passwords.

How can you protect a computer from electrical spikes and surges? Use a cable lock. Use an uninterruptible power supply. Use a surge protector. Unplug the computer when it is not in use.

Use a surge protector.

Which of the following types of websites typically provides the least security? online banking sites social media sites online shopping sites private business sites

social media sites

Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer? worm spam ransomware Trojan

Trojan

How is a worm different from a Trojan? a. A worm gathers information and transmits to a server, whereas a Trojan hides and then spreads through a network. b. A worm spreads through a network, whereas a Trojan hides inside another program. c. A worm reproduces itself on the same computer, whereas a Trojan attempts to spread through the network. d. A worm prevents a device from functioning until a ransom is paid, whereas a Trojan gathers information and transmits it to another device.

b. A worm spreads through a network, whereas a Trojan hides inside another program.

How will you decide which browser security settings to allow and which ones to block? a. If the browser security setting has been mentioned on several friends' timelines on Facebook then it must be a good one, so I should do change it on my computer too. b. I will need to review each browser security setting and use my best judgement. c. If the browser security setting is on a website sent from a friend, I always accept the setting. d. If the browser security setting is from my favorite online retailers, I will accept it because the retailer knows what I like.

b. I will need to review each browser security setting and use my best judgement.


Set pelajaran terkait

Production & Operations Management Chapter 13

View Set

Chapter 4 Section Assessment (1-33)

View Set

APES 1.8 Notes - Primary Productivity

View Set