BCIS Module 6

Ace your homework & exams now with Quizwiz!

You can configure your wireless router to protect your devices in all of the following ways EXCEPT ____. utilizing guest access when needed and turning it off when guests leave creating a strong password to access the router naming your router something you'll remember, like your street address turning off remote management to the device

naming your router something you'll remember, like your street address

How can you protect your information when using social media? Accept friend requests from people you want to be friends with. Use the same password and username for your social media that you use for your online banking account. Have your security information marked public on your social media account. Make sure you have your credit or debit card linked to your social media account.

Accept friend requests from people you want to be friends with.

How can an attacker execute malware through a script? An attacker can steal a cookie and impersonate you in a script, thereby infecting someone else's computer. An attacker can attach to a plug-in and when you allow the plug-in to run, it infects the website you were visiting. An attacker can impersonate a pop-up and when you click on it create a script to spread a Trojan. An attacker can attach a script to a program that you download which then infects your computer.

An attacker can attach a script to a program that you download which then infects your computer.

How will you decide which browser security settings to allow and which ones to block? If the browser security setting is from my favorite online retailers, I will accept it because the retailer knows what I like. I will need to review each browser security setting and use my best judgement. If the browser security setting is on a website sent from a friend, I always accept the setting. If the browser security setting has been mentioned on several friends' timelines on Facebook then it must be a good one, so I should do change it on my computer too.

I will need to review each browser security setting and use my best judgement.

How can you protect a computer from electrical spikes and surges? Use a cable lock. Use a surge protector. Use an uninterruptible power supply. Unplug the computer when it is not in use.

Use a surge protector.

How could an online attacker use your online profile to gather information about you to steal your identity? Use your profile pictures to figure out where you are. Pose as a long lost relative to become one of your friends. Use your posts to figure out answers to possible security questions. Post a message that appears to be from a friend warning about a security breach and encouraging you to change your account information.

Use your posts to figure out answers to possible security questions.

In which of the following real-life situations would it be useful to use a digital certificate? if you were submitting a paper to your professor if you were registering for an event if you were emailing a friend if you were signing a rental lease

if you were signing a rental lease

Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening? A hacker is trying to put a Trojan on her computer. A worm has infected her computer and she needs to unplug her device. It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer. Nothing has happened and the message is fine to ignore since she has not been home all day and her computer has not been turned on until now.

It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.

What is a digital certificate? The process of scrambling information so that it cannot be read A growing trend used to combine multiple types of authentication The key to unlock information into a readable format Technology used to verify a user's identity

Technology used to verify a user's identity

Which of the following is a characteristic of a strong password? A short phrase numbers in a series letters, numbers, and symbols personal information

letters, numbers, and symbols

What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank? encryption dumpster diving phishing identity theft

phishing

Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer? A Trojan A worm Ransomware Spam

A Trojan

There are various risks from attacks on Wi-Fi networks. These include all of the following EXCEPT _____. reading wireless transmissions viewing or stealing computer data downloading harmful content creating malware

creating malware

What would a password manager allow you to do? Test your memorization skills. Create and store multiple strong passwords. Make sure you do not repeat passwords on similar accounts. Prevent you from using birthdays in your passwords.

Create and store multiple strong passwords.

Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely? Cyberbullying Ergonomics Technology addiction Repetitive strain

Ergonomics

In terms of privacy, which of the following is a best practice? Saving your personal information as an email draft Keeping your Social Security number hidden in a locked box in your home Posting your location on social media Throwing away old bank statements that are more than three months old

Keeping your Social Security number hidden in a locked box in your home

After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________. cyberstalking cyberbullying social engineering data mining

cyberbullying

Technology can lead to all of the following behavioral risks EXCEPT _____. higher satisfaction with life social withdrawal depression and anxiety a sedentary lifestyle

higher satisfaction with life

With more and more people using technology, what physical health diagnosis is on the rise? cyberstalking cyberbullying repetitive strain injury technology addiction

repetitive strain injury

Which is a first step to deter thieves from accessing your financial information? Do not provide personal information over the phone or through email. Review financial and billing statements each month carefully. Follow up on calls regarding purchases that were not made. Be alert to signs that may indicate unusual activity in an account.

Do not provide personal information over the phone or through email.

Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one? His phone can generate an alarm even if it is on mute. He can use remote wiping to retrace the thief's steps. The current location of his phone can be pinpointed on a map through the phone's GPS. If the thief enters an incorrect passcode thee times, then a picture of the thief will be taken and emailed to Marcus.

He can use remote wiping to retrace the thief's steps.

How is the environment impacted by computers being thrown away in landfills? Data miners are digging up landfills looking for gold and platinum. The lead and mercury is seeping into the ground and water supply. The copper is creating fire dangers and explosive possibilities. The e-waste is increasing because more people are choosing to recycle.

The lead and mercury is seeping into the ground and water supply.

How does encryption work? It protects data on your hard drive, but once you choose to send it to someone, it is no longer protected. It is what happens when you download attachments from your email. It scrambles the information until the key is used to unscramble it. It is a key that you insert into your computer to unlock your saved files.

It scrambles the information until the key is used to unscramble it.

You can monitor and protect your financial data in all of the following ways EXCEPT _____. Being cautious about what information you post on social networking sites. Requesting a credit report and freezing your credit. Querying unfamiliar purchases found on your bank statements. Throwing financial documents older than three months in the trash.

Requesting a credit report and freezing your credit.


Related study sets

AP Computer Science Practice Exam A

View Set

Tenses: Present Simple and Present Continuous

View Set

Psychology of applied modern life

View Set

Epi lecture 4 - the 2x2 contingency table

View Set

Ch 4: Conversions and Calculations Used by Pharmacy Technicians

View Set