module 6 Test Study Guide
How does the discarding of old computer in a landfill have an effect on the environment?
- It increases the need for more and larger landfill sites - old computer parts contain toxic metals (lead and mercury) that lead to a contaminate ground and water supply
How can a person protect personal info collected by legitimate institutions?
- give only necessary information - review the info online sites have stored about you - request to be removed from mailing list - create a separate email only for a merchant or website that requires an address - Never use your social media account login info to login to another site
What are attack risk on a Wi-Fi Network?
- reading wireless transmissions (ex. usernames, passwords, and credit card numbers) - viewing or stealing computer data - injecting malware downloading harmful content
Identify in regards to privacy, which is best practice.
- shred financial documents and paperwork that may contain personal information - don't carry a social security number in wallet and never write it down on a check - don't provide personal info either over phone or email - keep personal info in a secure location (ex. home or apartment) - Be cautious about the info you post on social media - keep only the last 3 months of your recent financial statement and shred older documents be cautious when giving permission to a website or app to collect info - use common sense
How is the system of biometrics used in a hospital settings?
Biometrics security used people's unique characteristics of your face such as your Retina, fingerprint, voice, face, and iris
How can a person protect a computer from electrical surges?
By using a surge protector
Data backup
Copying files from a computer's hard drive that are then stored in a remote location
How can a hacker execute malware using a script?
Could exploit a security weakness in the add-on to download and execute malware on the user's computer
True or False: "Social networking sites have a history of providing tight security and giving users a clear understanding of how security features work".
False
True or False: "To protect your information and to help you to remember passwords, use your social media account login information to log into another site".
False
True or False: "Trojan is a malicious program that uses a computer network to replicate".
False Worms is a malicious program that uses a computer network to replicate
True or False: "To prevent a laptop from being stolen, you can use a surge protector."
False, you would use a cable lock
What is it called, when an attacker convinces you to enter in personal info at a fake website after receiving an email from a person pretending to be a bank employee?
Phishing
A Cyberbullying example would be
Posting, sending, or sharing negative, harmful, mean-spirited, and majority of the time false information of another person
digital certificate
Technology used to verify a user's identity and key that has been "signed" by a trusted third party
How does Encryption work?
The process of "scrambling" information in a way that cannot be read unless the user possesses the "key" to unlock it back to a readable format (decryption)
Difference between Trojan and Worm
Worm: a malicious program that uses a computer network to replicate Trojan: malware that hides inside another program, often one downloaded from the web
Identify situation in which a digital certificate is useful.
allows third party to verify the owner and if the key belongs to that owner
Identify what a browser security setting allow and which do not.
review each browser security setting and use my best judgment
Identify to what technology can lead to EXCEPT
technology addiction