Exam 6: Security and Safety

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In terms of privacy, which of the following is a best practice?

(Multiple Choice)
4.9/5
(34)

Creating a(n)_____ means copying files from a computer's hard drive and storing them in a remote location.

(Multiple Choice)
4.7/5
(41)

Which of the following types of websites typically provides the least security?

(Multiple Choice)
4.9/5
(38)

Technology can lead to all of the following behavioral risks EXCEPT _____.

(Multiple Choice)
4.9/5
(31)

Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?

(Multiple Choice)
4.9/5
(43)

Which of the following statements about browser security settings is false?

(Multiple Choice)
4.9/5
(35)

How can an attacker execute malware through a script?

(Multiple Choice)
4.7/5
(26)

Which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information?

(Multiple Choice)
4.7/5
(41)

How is a worm different from a Trojan?

(Multiple Choice)
4.7/5
(36)

How can you protect a computer from electrical spikes and surges?

(Multiple Choice)
4.9/5
(47)

Which is a first step to deter thieves from accessing your financial information?

(Multiple Choice)
4.9/5
(42)

What is a digital certificate?

(Multiple Choice)
4.7/5
(37)

Why is it not safe to connect to public Wi-Fi networks?

(Multiple Choice)
4.7/5
(42)

Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?

(Multiple Choice)
4.7/5
(38)

Your Facebook profile is private so there is no need to worry about your boss ever seeing your posts such as your Spring Break pictures.

(True/False)
4.8/5
(30)

A Trojan is a malicious program that uses a computer network to replicate.

(True/False)
4.8/5
(31)

How does discarding computers in a landfill affect the environment?

(Multiple Choice)
4.8/5
(31)

Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one?

(Multiple Choice)
4.9/5
(36)

To prevent a laptop from being stolen, you can use a surge protector.

(True/False)
4.9/5
(39)

In which of the following situations is a digital certificate useful?

(Multiple Choice)
5.0/5
(37)
Showing 21 - 40 of 40
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)