Deck 8: Safety and Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/71
Play
Full screen (f)
Deck 8: Safety and Security
1
To connect to the Internet in a home network, use a router.
True
2
Designing, manufacturing, using, and disposing of electronic products in ways friendly to both people and the environment is Energy Star computing.
False
3
A password is not a personal identification number.
True
4
An identity thief obtains personal information from various online and real-world sources.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
5
Service packs ensure that your data is scrambled as it travels between you and its Internet destination.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
6
Hacktivists is the study of safe and efficient working environments.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
7
The crime of hacking into and attacking networks is cybercrime.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
8
Netiquette involves humiliation, rumors, lies, taunts, or threats.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
9
Using personal features to identify a person is biometrics.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
10
Just about every site you visit stores a cookie in your computer's browser.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
11
When a hard drive fails, Mac users see what is commonly called the Blue Screen of Death.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
12
A personal health risk that you may face as you use computers is RSIs.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
13
Using your identity , thieves usually commit financial fraud.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
14
Cyberbullying involves the same dynamics as other forms of violence.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
15
Magnetic hard drives have no moving parts and are relatively stable.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
16
Internet addiction is the excessive use of the Internet for gaming, video, web surfing, and so on.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
17
A hoax involves throwing out "bait" in the form of an email or social media post in the hopes that a few users will respond.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
18
The process of authentication is used to verify a user.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
19
No legitimate company will ask you for email sign-in or personal information.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
20
Pharming is an illicit activity in which you are directed to a fake site to enter personal information.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
21
Cloud storage systems have ____ at various online locations that provide additional protection.
A) hackers
B) backups
C) encryption
D) malware
A) hackers
B) backups
C) encryption
D) malware
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
22
The effects of a(n) ____ can include physical damage and a general disruption of regular activities.
A) spam event
B) phishing episode
C) war driving incident
D) cyberattack
A) spam event
B) phishing episode
C) war driving incident
D) cyberattack
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
23
A secure website has ____ at the beginning of the URL.
A) http://
B) https:/
C) ftp://
D) hssp://
A) http://
B) https:/
C) ftp://
D) hssp://
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
24
Make sure your ____ provider uses strong encryption-based security and has a secure physical environment.
A) antivirus
B) hotspot
C) cloud
D) spam
A) antivirus
B) hotspot
C) cloud
D) spam
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
25
RSIs or ____ are caused by performing the same movement over and over again.
A) repetitive strain immersion
B) repetitive strain injuries
C) repetitive syndrome injuries
D) repetitive stress injuries
A) repetitive strain immersion
B) repetitive strain injuries
C) repetitive syndrome injuries
D) repetitive stress injuries
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
26
The device that sends the signal to connect your wireless devices to the Internet is ____.
A) wireless router
B) wireless firewall
C) wireless software
D) n one of the above
A) wireless router
B) wireless firewall
C) wireless software
D) n one of the above
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
27
Junk email, is also known as ____.
A) malware
B) spam
C) spyware
D) worm
A) malware
B) spam
C) spyware
D) worm
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
28
When a hard drive fails, Mac users see the ____.
A) Spinning Hand of Death
B) Grey Fail Screen
C) Marble of Doom
D) Blue Screen of Death
A) Spinning Hand of Death
B) Grey Fail Screen
C) Marble of Doom
D) Blue Screen of Death
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
29
Software protection includes all but which of the following?
A) Firewall
B) Antivirus
C) Antispyware
D) Adware
A) Firewall
B) Antivirus
C) Antispyware
D) Adware
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
30
The numeric score that affects your future ability to obtain credit is your ____.
A) credit score
B) netiquette
C) identity
D) pin number
A) credit score
B) netiquette
C) identity
D) pin number
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
31
A(n) ____ is an alphanumeric series of characters that you create to identify yourself online.
A) ID
B) password
C) username
D) none of the above
A) ID
B) password
C) username
D) none of the above
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
32
____ can lurk undetected in your system, infect it, and spread when you distribute infected files.
A) Spyware
B) Trojan horse
C) Viruses
D) Worms
A) Spyware
B) Trojan horse
C) Viruses
D) Worms
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
33
____ hard drives are especially prone to failure.
A) Wireless
B) Cloud
C) Solid state
D) Magnetic
A) Wireless
B) Cloud
C) Solid state
D) Magnetic
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
34
School districts often develop policies and guidelines that address ____.
A) social media sharing
B) cyberbullying
C) cyberstalking
D) cookies
A) social media sharing
B) cyberbullying
C) cyberstalking
D) cookies
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
35
When someone taps into your unprotected Wi-Fi network, it is called ____.
A) Wi-Fi war driving
B) Wi-Fi piggybacking
C) Wi-Fi hotspot
D) Wi-Fi firewall
A) Wi-Fi war driving
B) Wi-Fi piggybacking
C) Wi-Fi hotspot
D) Wi-Fi firewall
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
36
Malware includes all but which of the following?
A) Trojan horses
B) Worms
C) Viruses
D) Spam
A) Trojan horses
B) Worms
C) Viruses
D) Spam
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
37
Areas in a wireless network where you can access the Internet are ____.
A) hotspots
B) Trojan horses
C) piggybacks
D) war drives
A) hotspots
B) Trojan horses
C) piggybacks
D) war drives
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
38
Which browsing mode will not save your browsing history, temporary Internet files, form data, cookies, usernames, or passwords?
A) Stealth
B) Hid den
C) InPrivate
D) All of the above
A) Stealth
B) Hid den
C) InPrivate
D) All of the above
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
39
People who break into computers and networks are ____?
A) hackers
B) developers
C) worms
D) rootkits
A) hackers
B) developers
C) worms
D) rootkits
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
40
___ spread by automatically sending themselves to everyone in your address book.
A) Worms
B) Viruses
C) Rootkits
D) Spyware
A) Worms
B) Viruses
C) Rootkits
D) Spyware
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
41
A drawback of cloud storage includes ____
A) increased opportunities for data theft or manipulation
B) dependence on technology that the customer does not control
C) interrupted access to data during power or internet disruptions
D) all of the above
A) increased opportunities for data theft or manipulation
B) dependence on technology that the customer does not control
C) interrupted access to data during power or internet disruptions
D) all of the above
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
42
____ secretly collects user data, such as web surfing habits.
A) Spyware
B) Ransomware
C) All of the above
D) None of the above
A) Spyware
B) Ransomware
C) All of the above
D) None of the above
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
43
Suppose an email sender uses a fake address that is masked by a familiar address. This deceptive practice is known as ____.
A) address spoofing
B) pharming
C) war driving
D) wireless sniffing
A) address spoofing
B) pharming
C) war driving
D) wireless sniffing
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
44
On a secure website, a ____ icon may appear in the address bar.
A) bird
B) padlock
C) star
D) none of the above
A) bird
B) padlock
C) star
D) none of the above
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
45
____, or environmentally friendly, computing and recycling can reduce the environmental impact of electronic waste and ultimately reduce costs.
A) Blue
B) Green
C) Yellow
D) None of the above
A) Blue
B) Green
C) Yellow
D) None of the above
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
46
____ disguise themselves as useful programs or apps but do damage when you run them;
A) Trojan horses
B) Rootkits
C) All of the above
D) None of the above
A) Trojan horses
B) Rootkits
C) All of the above
D) None of the above
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
47
Which of the following privacy measures adds security by requiring two distinct items for verification?
A) Two-factor authentication
B) Two-step authentication
C) Two-factor verification
D) All of the above
A) Two-factor authentication
B) Two-step authentication
C) Two-factor verification
D) All of the above
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
48
Biometric systems include all but which of the following?
A) fingerprint scanners
B) hair scanners
C) facial recognition technology
D) eye scans
A) fingerprint scanners
B) hair scanners
C) facial recognition technology
D) eye scans
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
49
A ____ is a unit of data collected as a package so it can be transmitted in a network path.
A) data packet
B) hotspot
C) BSoD
D) RSI
A) data packet
B) hotspot
C) BSoD
D) RSI
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
50
Possible causes of data loss include all of the following, except ____:
A) regular backups
B) a hard drive crash,
C) a natural disaster
D) theft
A) regular backups
B) a hard drive crash,
C) a natural disaster
D) theft
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
51
____ can intercept and analyze data transmitted over any network, and it is a risk that can breach what otherwise might have been considered secured data.
A) Wireless sniffing
B) War driving
C) Piggybacking
D) Encryption
A) Wireless sniffing
B) War driving
C) Piggybacking
D) Encryption
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
52
____ on the Internet make up "the cloud."
A) Servers
B) Packets
C) Firewalls
D) Routers
A) Servers
B) Packets
C) Firewalls
D) Routers
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
53
Using a ____ can reduce risk of metabolic problems and circulatory issues by reducing time spent sitting.
A) standing desk
B) ergonomic chair
C) firewall
D) router
A) standing desk
B) ergonomic chair
C) firewall
D) router
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
54
A good example of a strong password is ____.
A) password1
B) 12345
C) EmilyMay1998
D) DumFDP076
A) password1
B) 12345
C) EmilyMay1998
D) DumFDP076
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
55
____ can infect your computer or compromise your identity.
A) Opening an email attachment
B) Going to an unsecured website
C) All of the above
D) None of the above
A) Opening an email attachment
B) Going to an unsecured website
C) All of the above
D) None of the above
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
56
Which of the following does NOT pose a significant threat to your physical, employment, and financial security?
A) cyberterrorists
B) hackers
C) blogger
D) spammers
A) cyberterrorists
B) hackers
C) blogger
D) spammers
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
57
Eyestrain, headaches, dry eyes, blurry vision, and double vision are symptoms of ____ syndrome.
A) computer vision
B) eye scan
C) biometric
D) ergonomic
A) computer vision
B) eye scan
C) biometric
D) ergonomic
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
58
Discarded computers, cell phones, and other electronics are considered ____.
A) electronic trash
B) e-waste
C) e-trash
D) all of the above
A) electronic trash
B) e-waste
C) e-trash
D) all of the above
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
59
A PIN or ____ is used to get into accounts through an ATM.
A) personal information number
B) personal identification name
C) personal information name
D) personal identification number
A) personal information number
B) personal identification name
C) personal information name
D) personal identification number
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
60
____ is the premeditated disruption of computers and networks.
A) Cyberterrorism
B) Hacking
C) Spamming
D) War driving
A) Cyberterrorism
B) Hacking
C) Spamming
D) War driving
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
61
Match between columns
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
62
____ are used as identification cards to authenticate the website owner.
A) Digital certificates
B) Packets
C) BSoDs
D) Hotspots
A) Digital certificates
B) Packets
C) BSoDs
D) Hotspots
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
63
____ is malicious software that blocks access to a computer system until a sum of money is paid.
A) Ransomware
B) Spyware
C) Hoaxware
D) Pharmware
A) Ransomware
B) Spyware
C) Hoaxware
D) Pharmware
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
64
Protect your mobile device from unauthorized use by ____.
A) locking the device when not in use
B) refraining from installing apps from unknown sources
C) all of the above
D) none of the above
A) locking the device when not in use
B) refraining from installing apps from unknown sources
C) all of the above
D) none of the above
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
65
Identity thieves may target your ____.
A) Social Security number
B) credit card and debit card numbers
C) PINs and passwords
D) all of the above
A) Social Security number
B) credit card and debit card numbers
C) PINs and passwords
D) all of the above
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
66
You can greatly reduce the chances of losing your financial data to fraudulent activities by ____.
A) making sure your shopping websites use https:// or lock icons
B) downloading electronic wallet software and security apps to use when you purchase items
C) using strong passwords that are unique for each account that you create
D) all of the above
A) making sure your shopping websites use https:// or lock icons
B) downloading electronic wallet software and security apps to use when you purchase items
C) using strong passwords that are unique for each account that you create
D) all of the above
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
67
Privacy can be protected by ____.
A) deleting old online accounts
B) increasing the privacy settings on your social network accounts
C) blocking third-party cookies from untrustworthy sites
D) all of the above
A) deleting old online accounts
B) increasing the privacy settings on your social network accounts
C) blocking third-party cookies from untrustworthy sites
D) all of the above
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
68
____ software identifies malware that tries to install on your computer or device.
A) Antivirus
B) Firewall
C) Electronic wallet
D) Digital certificate
A) Antivirus
B) Firewall
C) Electronic wallet
D) Digital certificate
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
69
Strong passwords do not ____.
A) include your name
B) have more than five characters
C) include a mixture of letters, numbers, and symbols
D) use both uppercase and lowercase letters
A) include your name
B) have more than five characters
C) include a mixture of letters, numbers, and symbols
D) use both uppercase and lowercase letters
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
70
A ____ protects your system from intruders.
A) firewall
B) digital wallet
C) digital certificate
D) none of the above
A) firewall
B) digital wallet
C) digital certificate
D) none of the above
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
71
Practice green computing by ____
A) using products that have the Energy Star logo
B) discarding old electronics using municipal curbside waste pickup
C) frequently purchasing the latest electronic gadget
D) all of the above
A) using products that have the Energy Star logo
B) discarding old electronics using municipal curbside waste pickup
C) frequently purchasing the latest electronic gadget
D) all of the above
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck