Deck 6: Managing Data With Data Tools

Full screen (f)
exit full mode
Question
In terms of privacy, which of the following is a best practice?

A) Saving your personal information as an email draft
B) Keeping your Social Security number hidden in a locked box in your home
C) Posting your location on social media
D) Throwing away old bank statements that are more than three months old
Use Space or
up arrow
down arrow
to flip the card.
Question
How can you protect your information when using social media?

A) Make sure you have your credit or debit card linked to your social media account.
B) Use the same password and username for your social media that you use for your online banking account.
C) Have your security information marked public on your social media account.
D) Accept friend requests from people you want to be friends with.
Question
A Trojan is a malicious program that uses a computer network to replicate.
Question
To protect your information and help you to remember passwords, use your social media account login information to log into another site.
Question
To prevent a laptop from being stolen, you can use a timelock device.
Question
Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening?

A) A hacker is trying to put a Trojan on her computer.
B) A worm has infected her computer and she needs to unplug her device.
C) It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.
D) Nothing has happened and the message is fine to ignore since she has not been home all day and her computer has not been turned on until now.
Question
Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one?

A) His phone can generate an alarm even if it is on mute.
B) He can use remote wiping to retrace the thief's steps.
C) The current location of his phone can be pinpointed on a map through the phone's GPS.
D) If the thief enters an incorrect passcode thee times, then a picture of the thief will be taken and emailed to Marcus.
Question
There are various risks from attacks on Wi-Fi networks. These include all of the following EXCEPT _____.

A) reading wireless transmissions
B) viewing or stealing computer data
C) downloading harmful content
D) creating malware
Question
How is the environment impacted by computers being thrown away in landfills?

A) Data miners are digging up landfills looking for gold and platinum.
B) The lead and mercury is seeping into the ground and water supply.
C) The copper is creating fire dangers and explosive possibilities.
D) The e-waste is increasing because more people are choosing to recycle.
Question
You can configure your wireless router to protect your devices in all of the following ways EXCEPT ____.

A) creating a strong password to access the router
B) naming your router something you'll remember, like your street address
C) turning off remote management to the device
D) utilizing guest access when needed and turning it off when guests leave
Question
Which of the following is a characteristic of a strong password?

A) A short phrase
B) numbers in a series
C) letters, numbers, and symbols
D) personal information
Question
Technology can lead to all of the following behavioral risks EXCEPT _____.

A) social withdrawal
B) depression and anxiety
C) a sedentary lifestyle
D) higher satisfaction with life
Question
How does encryption work?

A) It scrambles the information until the key is used to unscramble it.
B) It protects data on your hard drive, but once you choose to send it to someone, it is no longer protected.
C) It is a key that you insert into your computer to unlock your saved files.
D) It is what happens when you download attachments from your email.
Question
After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________.

A) cyberstalking
B) cyberbullying
C) social engineering
D) data mining
Question
How can you protect a computer from electrical spikes and surges?

A) Use a surge protector.
B) Unplug the computer when it is not in use.
C) Use an uninterruptible power supply.
D) Use a cable lock.
Question
You have been asked to create an authentication security plan for your company. Which of the following components would you incorporate to ensure your company is secured?

A) Have the computer identify blood type and oxygen levels.
B) Use biometric security that uses characteristics of your face, hands, or eyes.
C) Use two factor authentication where the user enters the password and a code sent his or her cell phone.
D) Use a password manager to create unique strong passwords.
Question
Cassidy is a medical assistant in a hospital and has access to many medical files. When she brings patients to the examining room, she can be observed swiping a card, typing in a password, and staring into what appears to be a camera, all attached to the computer. After completing her check-in, Cassidy leaves the patient in the examining room waiting on the doctor. It is important that she logs out of the system so the patient does not have access to the information stored in the hospital's database. Based on Cassidy's actions what systems do you think the hospital has in place to protect the patient medical records?

A) Digital certificates
B) Two factor authentication
C) Biometrics
D) Encryption
Question
Choose the strongest password.

A) Test1test2test3
B) colorbluesky
C) Welcome123
D) H@veAGr3atDaY!
Question
Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?

A) Cyberbullying
B) Ergonomics
C) Technology addiction
D) Repetitive strain
Question
Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?

A) A worm
B) A Trojan
C) Spam
D) Ransomware
Question
Siobhan has recently opened a Facebook account and as a new user, is posting frequently and accepting many friend requests. You see a post about an upcoming trip and also notice that her profile is open to the public. How can you help Siobhan navigate this new world of social-networking?

A) Tell her to be cautious about what information she posts.
B) Tell her to allow anyone who "friends" her view her information.
C) Show her how to view the security settings.
D) Show her what information the people she has accepted as friends can view.
Question
Social-networking sites have a history of providing tight security and giving users a clear understanding of how security features work.
Question
What is a digital certificate?

A) The key to unlock information into a readable format
B) Technology used to verify a user's identity
C) The process of scrambling information so that it cannot be read
D) A growing trend used to combine multiple types of authentication
Question
In which of the following real-life situations would it be useful to use a digital certificate?

A) if you were submitting a paper to your professor
B) if you were registering for an event
C) if you were emailing a friend
D) if you were signing a rental lease
Question
You can monitor and protect your financial data in all of the following ways EXCEPT _____.

A) Being cautious about what information you post on social networking sites.
B) Requesting a credit report and freezing your credit.
C) Querying unfamiliar purchases found on your bank statements.
D) Throwing financial documents older than three months in the trash.
Question
You are watching the news and learn that there has been a security breach of credit card information at a large department store. The news report also states that the same company has had recent layoffs. The report says that the company is looking into whether or not the breach was done by an insider. Why would the company investigate the possibility of the breach being from an insider?

A) Because insiders like to cause disruption and panic among citizens.
B) Because insiders create threats after incidents at their places of employment.
C) Because insiders change contents to make a political statement.
D) Because insiders lack the knowledge of computers and networks to perform this task.
Question
With more and more people using technology, what physical health diagnosis is on the rise?

A) cyberstalking
B) cyberbullying
C) repetitive strain injury
D) technology addiction
Question
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?

A) encryption
B) dumpster diving
C) phishing
D) identity theft
Question
Lately you have been noticing more and more ads from clothing stores are popping up on your Facebook page, and when you log into your email there are unsolicited emails from clothing vendors as well. Thinking back, what most likely has changed on your computer to allow these thing to be happening?

A) You permitted pop-ups from a clothing website.
B) Cookies were accepted from a clothing website.
C) You blocked a script from running that normally blocked these ads.
D) Your browsing data has clothing websites in it.
Question
In which of the following situations would you find a data backup helpful?

A) when a slow Internet connection is available
B) during a natural disaster because a data backup provides a copy of previous data
C) if there has been a software malfunction, because then a data backup can restore a previous version
D) if a data backup overwrites current data, so you can correct user error
Question
How could an online attacker use your online profile to gather information about you to steal your identity?

A) Use your profile pictures to figure out where you are.
B) Pose as a long lost relative to become one of your friends.
C) Use your posts to figure out answers to possible security questions.
D) Post a message that appears to be from a friend warning about a security breach and encouraging you to change your account information.
Question
Why is it not safe to connect to public Wi-Fi networks?

A) Because these networks are rarely protected.
B) Because an attacker may have set up an evil twin.
C) Because the connection is often too slow.
D) Because it can weaken your own Wi-Fi wireless router.
Question
How will you decide which browser security settings to allow and which ones to block?

A) If the browser security setting is from my favorite online retailers, I will accept it because the retailer knows what I like.
B) I will need to review each browser security setting and use my best judgement.
C) If the browser security setting is on a website sent from a friend, I always accept the setting.
D) If the browser security setting has been mentioned on several friends' timelines on Facebook then it must be a good one, so I should do change it on my computer too.
Question
How can an attacker execute malware through a script?

A) An attacker can steal a cookie and impersonate you in a script, thereby infecting someone else's computer.
B) An attacker can attach to a plug-in and when you allow the plug-in to run, it infects the website you were visiting.
C) An attacker can impersonate a pop-up and when you click on it create a script to spread a Trojan.
D) An attacker can attach a script to a program that you download which then infects your computer.
Question
Frank thinks he has been a victim of identity theft. Which of the following scenarios might have led him to that conclusion?

A) A new bank account has been opened in his name in a city where he does not live.
B) He found out he owns a new car, but he never actually bought one.
C) There are charges on his credit card for a ski trip in Colorado and he has never been to Colorado.
D) He received a letter from a bankruptcy court regarding his claim that he never filed.
Question
Which of the following statements about browser security settings are true?

A) You can choose which sites run pop-ups.
B) Your accumulated web history is stored forever.
C) You can deny cookies.
D) Sites can-- be allowed or blocked from running scripts.
Question
Your Facebook profile is private so there is no need to worry about your boss ever seeing your posts such as your Spring Break pictures.
Question
What would a password manager allow you to do?

A) Test your memorization skills.
B) Create and store multiple strong passwords.
C) Make sure you do not repeat passwords on similar accounts.
D) Prevent you from using birthdays in your passwords.
Question
Which is a first step to deter thieves from accessing your financial information?

A) Do not provide personal information over the phone or through email.
B) Review financial and billing statements each month carefully.
C) Follow up on calls regarding purchases that were not made.
D) Be alert to signs that may indicate unusual activity in an account.
Question
How is a worm different from a Trojan?

A) A worm reproduces itself on the same computer, whereas a Trojan attempts to spread through the network.
B) A worm gathers information and transmits to a server, whereas a Trojan hides and then spreads through a network.
C) A worm spreads through a network, whereas a Trojan hides inside another program.
D) A worm prevents a device from functioning until a ransom is paid, whereas a Trojan gathers information and transmits it to another device.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/40
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 6: Managing Data With Data Tools
1
In terms of privacy, which of the following is a best practice?

A) Saving your personal information as an email draft
B) Keeping your Social Security number hidden in a locked box in your home
C) Posting your location on social media
D) Throwing away old bank statements that are more than three months old
B
2
How can you protect your information when using social media?

A) Make sure you have your credit or debit card linked to your social media account.
B) Use the same password and username for your social media that you use for your online banking account.
C) Have your security information marked public on your social media account.
D) Accept friend requests from people you want to be friends with.
D
3
A Trojan is a malicious program that uses a computer network to replicate.
False
4
To protect your information and help you to remember passwords, use your social media account login information to log into another site.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
5
To prevent a laptop from being stolen, you can use a timelock device.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
6
Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening?

A) A hacker is trying to put a Trojan on her computer.
B) A worm has infected her computer and she needs to unplug her device.
C) It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.
D) Nothing has happened and the message is fine to ignore since she has not been home all day and her computer has not been turned on until now.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
7
Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one?

A) His phone can generate an alarm even if it is on mute.
B) He can use remote wiping to retrace the thief's steps.
C) The current location of his phone can be pinpointed on a map through the phone's GPS.
D) If the thief enters an incorrect passcode thee times, then a picture of the thief will be taken and emailed to Marcus.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
8
There are various risks from attacks on Wi-Fi networks. These include all of the following EXCEPT _____.

A) reading wireless transmissions
B) viewing or stealing computer data
C) downloading harmful content
D) creating malware
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
9
How is the environment impacted by computers being thrown away in landfills?

A) Data miners are digging up landfills looking for gold and platinum.
B) The lead and mercury is seeping into the ground and water supply.
C) The copper is creating fire dangers and explosive possibilities.
D) The e-waste is increasing because more people are choosing to recycle.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
10
You can configure your wireless router to protect your devices in all of the following ways EXCEPT ____.

A) creating a strong password to access the router
B) naming your router something you'll remember, like your street address
C) turning off remote management to the device
D) utilizing guest access when needed and turning it off when guests leave
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following is a characteristic of a strong password?

A) A short phrase
B) numbers in a series
C) letters, numbers, and symbols
D) personal information
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
12
Technology can lead to all of the following behavioral risks EXCEPT _____.

A) social withdrawal
B) depression and anxiety
C) a sedentary lifestyle
D) higher satisfaction with life
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
13
How does encryption work?

A) It scrambles the information until the key is used to unscramble it.
B) It protects data on your hard drive, but once you choose to send it to someone, it is no longer protected.
C) It is a key that you insert into your computer to unlock your saved files.
D) It is what happens when you download attachments from your email.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
14
After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________.

A) cyberstalking
B) cyberbullying
C) social engineering
D) data mining
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
15
How can you protect a computer from electrical spikes and surges?

A) Use a surge protector.
B) Unplug the computer when it is not in use.
C) Use an uninterruptible power supply.
D) Use a cable lock.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
16
You have been asked to create an authentication security plan for your company. Which of the following components would you incorporate to ensure your company is secured?

A) Have the computer identify blood type and oxygen levels.
B) Use biometric security that uses characteristics of your face, hands, or eyes.
C) Use two factor authentication where the user enters the password and a code sent his or her cell phone.
D) Use a password manager to create unique strong passwords.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
17
Cassidy is a medical assistant in a hospital and has access to many medical files. When she brings patients to the examining room, she can be observed swiping a card, typing in a password, and staring into what appears to be a camera, all attached to the computer. After completing her check-in, Cassidy leaves the patient in the examining room waiting on the doctor. It is important that she logs out of the system so the patient does not have access to the information stored in the hospital's database. Based on Cassidy's actions what systems do you think the hospital has in place to protect the patient medical records?

A) Digital certificates
B) Two factor authentication
C) Biometrics
D) Encryption
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
18
Choose the strongest password.

A) Test1test2test3
B) colorbluesky
C) Welcome123
D) H@veAGr3atDaY!
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
19
Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?

A) Cyberbullying
B) Ergonomics
C) Technology addiction
D) Repetitive strain
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
20
Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?

A) A worm
B) A Trojan
C) Spam
D) Ransomware
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
21
Siobhan has recently opened a Facebook account and as a new user, is posting frequently and accepting many friend requests. You see a post about an upcoming trip and also notice that her profile is open to the public. How can you help Siobhan navigate this new world of social-networking?

A) Tell her to be cautious about what information she posts.
B) Tell her to allow anyone who "friends" her view her information.
C) Show her how to view the security settings.
D) Show her what information the people she has accepted as friends can view.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
22
Social-networking sites have a history of providing tight security and giving users a clear understanding of how security features work.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
23
What is a digital certificate?

A) The key to unlock information into a readable format
B) Technology used to verify a user's identity
C) The process of scrambling information so that it cannot be read
D) A growing trend used to combine multiple types of authentication
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
24
In which of the following real-life situations would it be useful to use a digital certificate?

A) if you were submitting a paper to your professor
B) if you were registering for an event
C) if you were emailing a friend
D) if you were signing a rental lease
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
25
You can monitor and protect your financial data in all of the following ways EXCEPT _____.

A) Being cautious about what information you post on social networking sites.
B) Requesting a credit report and freezing your credit.
C) Querying unfamiliar purchases found on your bank statements.
D) Throwing financial documents older than three months in the trash.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
26
You are watching the news and learn that there has been a security breach of credit card information at a large department store. The news report also states that the same company has had recent layoffs. The report says that the company is looking into whether or not the breach was done by an insider. Why would the company investigate the possibility of the breach being from an insider?

A) Because insiders like to cause disruption and panic among citizens.
B) Because insiders create threats after incidents at their places of employment.
C) Because insiders change contents to make a political statement.
D) Because insiders lack the knowledge of computers and networks to perform this task.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
27
With more and more people using technology, what physical health diagnosis is on the rise?

A) cyberstalking
B) cyberbullying
C) repetitive strain injury
D) technology addiction
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
28
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?

A) encryption
B) dumpster diving
C) phishing
D) identity theft
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
29
Lately you have been noticing more and more ads from clothing stores are popping up on your Facebook page, and when you log into your email there are unsolicited emails from clothing vendors as well. Thinking back, what most likely has changed on your computer to allow these thing to be happening?

A) You permitted pop-ups from a clothing website.
B) Cookies were accepted from a clothing website.
C) You blocked a script from running that normally blocked these ads.
D) Your browsing data has clothing websites in it.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
30
In which of the following situations would you find a data backup helpful?

A) when a slow Internet connection is available
B) during a natural disaster because a data backup provides a copy of previous data
C) if there has been a software malfunction, because then a data backup can restore a previous version
D) if a data backup overwrites current data, so you can correct user error
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
31
How could an online attacker use your online profile to gather information about you to steal your identity?

A) Use your profile pictures to figure out where you are.
B) Pose as a long lost relative to become one of your friends.
C) Use your posts to figure out answers to possible security questions.
D) Post a message that appears to be from a friend warning about a security breach and encouraging you to change your account information.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
32
Why is it not safe to connect to public Wi-Fi networks?

A) Because these networks are rarely protected.
B) Because an attacker may have set up an evil twin.
C) Because the connection is often too slow.
D) Because it can weaken your own Wi-Fi wireless router.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
33
How will you decide which browser security settings to allow and which ones to block?

A) If the browser security setting is from my favorite online retailers, I will accept it because the retailer knows what I like.
B) I will need to review each browser security setting and use my best judgement.
C) If the browser security setting is on a website sent from a friend, I always accept the setting.
D) If the browser security setting has been mentioned on several friends' timelines on Facebook then it must be a good one, so I should do change it on my computer too.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
34
How can an attacker execute malware through a script?

A) An attacker can steal a cookie and impersonate you in a script, thereby infecting someone else's computer.
B) An attacker can attach to a plug-in and when you allow the plug-in to run, it infects the website you were visiting.
C) An attacker can impersonate a pop-up and when you click on it create a script to spread a Trojan.
D) An attacker can attach a script to a program that you download which then infects your computer.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
35
Frank thinks he has been a victim of identity theft. Which of the following scenarios might have led him to that conclusion?

A) A new bank account has been opened in his name in a city where he does not live.
B) He found out he owns a new car, but he never actually bought one.
C) There are charges on his credit card for a ski trip in Colorado and he has never been to Colorado.
D) He received a letter from a bankruptcy court regarding his claim that he never filed.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following statements about browser security settings are true?

A) You can choose which sites run pop-ups.
B) Your accumulated web history is stored forever.
C) You can deny cookies.
D) Sites can-- be allowed or blocked from running scripts.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
37
Your Facebook profile is private so there is no need to worry about your boss ever seeing your posts such as your Spring Break pictures.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
38
What would a password manager allow you to do?

A) Test your memorization skills.
B) Create and store multiple strong passwords.
C) Make sure you do not repeat passwords on similar accounts.
D) Prevent you from using birthdays in your passwords.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
39
Which is a first step to deter thieves from accessing your financial information?

A) Do not provide personal information over the phone or through email.
B) Review financial and billing statements each month carefully.
C) Follow up on calls regarding purchases that were not made.
D) Be alert to signs that may indicate unusual activity in an account.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
40
How is a worm different from a Trojan?

A) A worm reproduces itself on the same computer, whereas a Trojan attempts to spread through the network.
B) A worm gathers information and transmits to a server, whereas a Trojan hides and then spreads through a network.
C) A worm spreads through a network, whereas a Trojan hides inside another program.
D) A worm prevents a device from functioning until a ransom is paid, whereas a Trojan gathers information and transmits it to another device.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 40 flashcards in this deck.