Computer Science 105 Chapter 6 and 7 Study Guide

Ace your homework & exams now with Quizwiz!

Which is a first step to deter thieves from accessing your financial information? (516103)

A:Do not provide over the phone or through email.

Businesses use webinars for the following reasons EXCEPT _____. (530599)

A:Group discussions

How can an attacker execute malware through a script? (516095)

An attacker can • attach a script to a program that you download which then infects your computer.

_____ ensures that the person requesting access to a computer is not an imposter. (530440)

Authentication

In the email communication process, what is the role of the email server? (516523)

B:Routing email messages through the Internet or a private network

What is a digital certificate? (516086)

B:Technology used to verify a user's identity

Which of the following statements about browser security settings is false? (530443)

B:You must keep your history as long as you use the browser.

How would you describe the social networking site YouTube? (516521)

B:YouTube is a media and sharing network that lets users display and view videos and then post comments.

You just got back from vacation and are getting ready to post pictures online of all the fun you had. Which of the following photos would be appropriate to post on social media? (516527)

C:A photo of you horseback riding on the beach with friends.

How is a worm different from a Trojan? (516098)

C:A worm spreads through a network, whereas a Trojan hides inside another program

Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening? (516074)

C:It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.

How can you protect personal information gathered by legitimate organizations? (530431)

Create a separate email account for receiving information from websites.

What would a password manager allow you to do? (516101)

Create and store passwords.

Which of the following is the strongest password? (530439)

D:H@veAGr3atDaY!

Social-networking sites have a history of providing tight security and giving users a clear understanding of how security features work. (516093)

False

What is one advantage of a company using an anonymous messaging app? (516546)

It allows for honest feedback without disclosing identities.

How can you protect a computer from electrical spikes and surges? (516076)

Use a surge protector

How do you create an email message? (516537)

Use an app or software to compose and send information.

In his small business, Adrian wants to use his laptop to place and receive phone calls. What type of service should he use? (530590)

Voice over Internet Protocol (VoIP)

In which of the following situations is a digital certificate useful? (530435)

You are signing a rental lease

If you want to remove an older email from your inbox, but not permanently delete it, you can _____ it. (516524)

archive

There are various risks from attacks on Wi- Fi networks. These include all of the following EXCEPT _____. (516080

creating malware

To observe professional messaging guidelines, you should avoid using the following EXCEPT _____. (530595)

meeting invites

With more and more people using technology, what physical health diagnosis is on the rise? (516097)

repetitive strain injury

On what type of network can you rent things such as cars, tools, and rooms? (530600)

sharing economy network

Which of the following types of websites typically provides the least security? (530444)

social media sites

Gwen is starting a blog about vegetable gardening. What information should she include on the blog's home page? (530597)

A lists of posts with the most recent ones at the top

You received an unpleasant email from a coworker and you want to discreetly notify your supervisor. Which of the following features could you use to do this? (530602

A:BCC your supervisor in your response

The news reports a security breach of credit card information at a large department store that has recently laid off many employees. Why should the store investigate the possibility of the breach being from an insider? (530432)

B:Because insiders sometimes create threats after incidents at their places of employment

How will you decide which browser security settings to allow and which ones to block? (516094)

B:I will need to review each browser security setting and use my best judgement.

Cassidy is a medical assistant in a hospital and has access to many medical files. When she brings patients to the examining room, she can be observed swiping a card, typing in a password, and staring into what appears to be a camera, all attached to the computer. After completing her check-in, Cassidy leaves the patient in the examining room waiting on the doctor. It is important that she logs out of the system so the patient does not have access to the information stored in the hospital's database. Based on Cassidy's actions what systems do you think the hospital has in place to protect the patient medical records? (530441)

Biometrics

Which of the following is an example of someone who is NOT practicing good netiquette? (516526)

C:Vance found • pictures of Dorie in a bikini on Facebook and texted them to other men in the office.

A Trojan is a malicious program that uses a computer network to replicate. (516075)

False

[email protected] an appropriate email address to use for communicating with potential employers. (530598)

False

Everything you do online is recorded in the cloud, but you can choose to erase it, as you have control over your digital footprint. (516530)

False

Netiquette only applies to social media and social networking, not emails and instant messaging. (516528)

False

To prevent a laptop from being stolen, you can use a surge protector. (530438)

False

Twitter is an example of a wiki, which allows for collaborative editing by its users.

False

Wikis are not useful in education because students cannot use them to share notes and give feedback. (530585)

False

Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one? (516078)

He can use remote wiping to retrace the thief's steps

An online game developer has an issue with its most popular game and must take the server offline. The company posts an update on its social media page. How is this a positive use of social networking? (516545)

It allows the company to communicate to many users at once about an issue and release status updates.

Social networking can leave you exposed to criminal activity in the following ways EXCEPT _____. (530594)

Using your photos and posts to form impressions about your character

Daniela's company has decided to allow employees to work from home. What can the company use to let employees continue to meet and collaborate on group projects? (530586)

Web conferences

How would you design a webinar that would be interactive? (516539)

add a poll

A business can use a wiki in the following ways EXCEPT _____. (530591)

aggregating content

After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________. (516072)

cyberbullying

Creating a(n) _____ means copying files from a computer's hard drive and storing them in a remote location. (530433)

data backup

Posting hostile or insulting comments in response to someone else's blog post is called _____. (516534)

flaming

Technology can lead to all of the following behavioral risks EXCEPT _____. (516071)

higher satisfaction with life

Social networking includes the following positive effects EXCEPT _________. (530593)

increasing your privacy

Which of the following is a characteristic of a strong password? (516081)

letters, numbers, and symbols

Which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information? (530442)

pretexting

In business, what has replaced social bookmarking in helping users find the most relevant, high-quality information, collect it, and share it with others? (516541)

social curation sites

if you do not want to uIe your Internet service provider (ISP) for your email account, how can you acquire a webmail account? (530589)

through an online service

You can monitor and protect your financial data in all of the following ways EXCEPT _____. (516088)

B:Requesting a credit and freezing your credit.

Siobhan has recently opened a Facebook account and as a new user, is posting frequently and accepting many friend requests. You see a post about an upcoming trip and notice that her profile is open to the public. What can you tell Siobhan to help her use social networking safely? (530436)

Be cautious about what information she posts

You just posted new photographs to Shutterfly, and the site asks you to review the metadata. Metadata includes the following information EXCEPT _____. (530601)

The HTML coding

Why is it not safe to connect to public Wi-Fi networks? (530434)

Because these networks are rarely protected

How does encryption work? (516084)

It scrambles the key is used to unscramble it.

What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank? (516089)

phising

Which of the following is typical content for a podcast? (530588)

radio shows

How might a business use a blog? (516518)

to communicate with customers

Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer? (516073)

trojan

Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely? (516070)

Ergonomics

In terms of privacy, which of the following is a best practice? (516079)

Keeping your Social hidden in a locked box in your home

How does discarding computers in a landfill affect the environment? (530430)

Lead and mercury in computer parts are seeping into the ground and water supply.

What type of security requires something you know and something you have that no one else has? (530437)

two-factor authentication


Related study sets

Management of Financial Institutions : Intro, Chapter 1, Chapter 2

View Set

Business Administration- Human Relations/People Skills

View Set

Rico - Spanish III - VHL Grammar Review

View Set

Under A Painted Sky by Stacey Lee

View Set