Module 6 (Security & Safety)

Ace your homework & exams now with Quizwiz!

Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?

A trojan

How is a worm different from a Trojan?

A worm spreads through a network, whereas a Trojan hides inside another program.

How can you protect your information when using social media?

Accept friend requests from people you want to be friends with

Which term refers to the science that specifies the design and arrangement of items you can use so you interact with the items efficiently and safely?

Ergonomics

Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one?

He can use remote wiping to retrace the thief's steps

What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?

Phishing

With more and more people using technology, what physical health diagnosis is on the rise?

Repetitive strain injury

You can monitor and protect your financial data in all of the following ways EXCEPT

Requesting a credit report and and freezing your credit

What is a digital certificate?

Technology used to verify a user's identity

How could an online attacker use your online profile to gather information about you to steal your identity?

Use your posts to figure out answers to possible security questions


Related study sets

Literary Characters/Places/Memorable Clues

View Set

Preconception and Antepartum Care

View Set

A&P The Skeletal System: Bone Tissue

View Set

General MCAT Chem/Phys I keep missing

View Set