Deck 8: Safety and Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/70
Play
Full screen (f)
Deck 8: Safety and Security
1
It is possible to avoid being tracked through your browser when shopping online.
True
2
No legitimate company will ask you for email sign-in or personal information.
True
3
Designing, manufacturing, using, and disposing of electronic products in ways friendly to both people and the environment is Energy Star computing.
False
4
Hactivists is the study of safe and efficient working environments.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
5
Using personal features to indentify a person is biometrics.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
6
A hoax involves throwing out "bait" in the form of an email or social media post, in the hopes that a few users will respond.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
7
Using your identity , thieves usually commit financial fraud.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
8
An identity thief obtains personal information from various online and real-world sources.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
9
To connect to the Internet in a home network, use a router.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
10
A personal health risk that we may face as we use computers is RSIs.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
11
Service packs ensure that your data is scrambled as it travels between you and its Internet destination.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
12
Strong passwords are typically three- to four-digit numbers.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
13
A password is not a personal identification number.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
14
The process of authentication is used to verify a user.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
15
Cyberbullying involves the same dynamics as other forms of violence.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
16
Netiquette involves humiliation, rumors, lies, taunts, or threats.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
17
Pharming is an illicit activity in which you are directed to a fake site to enter personal information.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
18
When a hard drive fails, Mac users see what is commonly called the Blue Screen of Death.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
19
A username is a unique nine-digit number assigned to each individual in the United States.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
20
Just about every site you visit stores a cookie in your computer's browser.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
21
Internet addiction is the excessive use of the Internet for all but which of the following?
A) video
B) gaming
C) blogging
D) none of the above
A) video
B) gaming
C) blogging
D) none of the above
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
22
Make sure your ____ provider uses strong encryption-based security and has a secure physical environment.
A) antivirus
B) hotspot
C) cloud
D) spam
A) antivirus
B) hotspot
C) cloud
D) spam
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
23
Rootkits collect bits of data, and can change your default home page. _________________________
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
24
The effects of a(n) ____ can include physical damage and a general disruption of regular activities.
A) spam
B) phishing
C) war driving
D) cyberattack
A) spam
B) phishing
C) war driving
D) cyberattack
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
25
Magnetic hard drives have no moving parts and are relatively stable. _________________________
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
26
The study of safe and efficient working environments is ergonomics. _________________________
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
27
Internet addiction the excessive use of the Internet for gaming, video, Web surfing, etc. _________________________
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
28
When someone taps into your unprotected Wi-Fi network, it is called Wi-Fi piggybacking. _________________________
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
29
RSIs or ____ are caused by performing the same movement over and over again.
A) repetitive strain immersion
B) repetitive strain injuries
C) repetitive syndrome injuries
D) repetitive stress injuries
A) repetitive strain immersion
B) repetitive strain injuries
C) repetitive syndrome injuries
D) repetitive stress injuries
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
30
Fraud can have a long lasting effect on your credit score. _________________________
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
31
Cloud storage systems have ____ at various online locations that provide additional protection.
A) hackers
B) backups
C) encryption
D) malware
A) hackers
B) backups
C) encryption
D) malware
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
32
____ hard drives are especially prone to failure.
A) Wireless
B) Cloud
C) Solid state
D) Magnetic
A) Wireless
B) Cloud
C) Solid state
D) Magnetic
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
33
To provide battery backup during a short period, install an uninterruptible power system . _________________________
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
34
When a hard drive fails, Mac users see the ____.
A) Spinning Hand of Death
B) Grey Fail Screen
C) Marble of Doom
D) Blue Screen of Death
A) Spinning Hand of Death
B) Grey Fail Screen
C) Marble of Doom
D) Blue Screen of Death
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
35
The study of safe and efficient working environments is ____?
A) ergonomics
B) white hat
C) computer vision syndrome
D) encryption
A) ergonomics
B) white hat
C) computer vision syndrome
D) encryption
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
36
The hacker community includes white hat and grey hat hackers. _________________________
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
37
People who break into computers and networks are ____?
A) hackers
B) developers
C) worms
D) rootkits
A) hackers
B) developers
C) worms
D) rootkits
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
38
The crime of hacking into and attacking networks is cybercrime. _________________________
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
39
A hoax can be an email that warns about a nonexistant virus in order to get you to click a link that installs malware. _________________________
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
40
Junk email, is also known as ____.
A) malware
B) spam
C) spyware
D) worm
A) malware
B) spam
C) spyware
D) worm
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
41
A PIN or ____ is used to get into accounts through ATM.
A) personal information number
B) personal identification name
C) personal information name
D) personal identification number
A) personal information number
B) personal identification name
C) personal information name
D) personal identification number
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
42
Malware includes all but which of the following?
A) Trojan horse
B) Spyware
C) Virus
D) Spam
A) Trojan horse
B) Spyware
C) Virus
D) Spam
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
43
A(n) ____ is a unique nine-digit number assigned to each individual in the United States.
A) PIN number
B) Social Security number
C) password
D) username
A) PIN number
B) Social Security number
C) password
D) username
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
44
Software protection includes all but which of the following?
A) Firewall
B) Antivirus
C) Antispyware
D) Hotspots
A) Firewall
B) Antivirus
C) Antispyware
D) Hotspots
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
45
Cybercriminals take advantage of flaws in all but which of the following?
A) online banking
B) email notifications
C) shopping sites
D) wireless networks
A) online banking
B) email notifications
C) shopping sites
D) wireless networks
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
46
A(n) ____ is an alphanumeric series of characters that you create to identify yourself online.
A) ID
B) password
C) username
D) none of the above
A) ID
B) password
C) username
D) none of the above
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
47
___ spread by automatically sending themselves to everyone in your address book.
A) Worms
B) Viruses
C) Rootkits
D) Spyware
A) Worms
B) Viruses
C) Rootkits
D) Spyware
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
48
When someone taps into your unprotected Wi-Fi network, it is called ____.
A) Wi-Fi war driving
B) Wi-Fi piggybacking
C) Wi-Fi hotspot
D) Wi-Fi firewall
A) Wi-Fi war driving
B) Wi-Fi piggybacking
C) Wi-Fi hotspot
D) Wi-Fi firewall
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
49
Software patches provided by the publisher to fix bugs and enhance performance are ____.
A) wireless packs
B) service packs
C) encryption packs
D) antivirus packs
A) wireless packs
B) service packs
C) encryption packs
D) antivirus packs
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
50
____ can lurk undetected in your system, infect it, and spread when you distribute infected files.
A) Spyware
B) Trojan horse
C) Viruses
D) Worms
A) Spyware
B) Trojan horse
C) Viruses
D) Worms
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
51
A set of online communication practices and rules is ____.
A) cyberstalking
B) cyberbullying
C) netiquette
D) guideline
A) cyberstalking
B) cyberbullying
C) netiquette
D) guideline
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
52
Which of the following does NOT pose a significant threat to your physical, employment, and financial security?
A) cyberterrorists
B) hackers
C) blogger
D) spammers
A) cyberterrorists
B) hackers
C) blogger
D) spammers
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
53
The numeric score that affects your future ability to obtain credit is your ____.
A) credit score
B) netiquette
C) identity
D) pin number
A) credit score
B) netiquette
C) identity
D) pin number
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
54
____ ensures that your data is scrambled as it travels between you and its Internet destination.
A) Service packs
B) Firewall
C) Encryption
D) Passwords
A) Service packs
B) Firewall
C) Encryption
D) Passwords
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
55
A(n) ____ obtains personal information from various online and real-world sources.
A) rootkit
B) identity thief
C) ATM
D) electronic wallet
A) rootkit
B) identity thief
C) ATM
D) electronic wallet
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
56
School districts often develop policies and guidelines that address ____.
A) social media sharing
B) cyberbullying
C) cyberstalking
D) cookies
A) social media sharing
B) cyberbullying
C) cyberstalking
D) cookies
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
57
A secure Web site has ____ at the beginning of the URL.
A) http://
B) https:/
C) ftp://
D) hssp://
A) http://
B) https:/
C) ftp://
D) hssp://
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
58
To avoid being tracked through your browser online, use which of the following modes?
A) Stealth
B) Hid den
C) InPrivate
D) All of the above
A) Stealth
B) Hid den
C) InPrivate
D) All of the above
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
59
Areas in a wireless network where you can access the Internet are ____.
A) hotspots
B) trojan horse
C) piggybacking
D) war driving
A) hotspots
B) trojan horse
C) piggybacking
D) war driving
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
60
The device that sends the signal to connect your wireless devices to the Internet is ____.
A) wireless router
B) wireless firewall
C) wireless software
D) none of the above
A) wireless router
B) wireless firewall
C) wireless software
D) none of the above
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
61
Discarded computers, cell phones, and other electronics are considered ____.
A) electronic trash
B) e-waste
C) e-trash
D) all of the above
A) electronic trash
B) e-waste
C) e-trash
D) all of the above
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
62
On a secure Web site, a ____ icon may appear in the address bar.
A) bird
B) padlock
C) star
D) none of the above
A) bird
B) padlock
C) star
D) none of the above
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
63
An illicit activity in which you are directed to a fake site to enter personal information is ____.
A) phishing
B) routing
C) pharming
D) all of the above
A) phishing
B) routing
C) pharming
D) all of the above
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
64
A good example of a strong password is ____.
A) password1
B) 12345
C) EmilyMay1998
D) DumFDP076
A) password1
B) 12345
C) EmilyMay1998
D) DumFDP076
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
65
____, or environmentally friendly, computing and recycling can reduce the environmental impact of electronic waste and ultimately reduce costs.
A) Blue
B) Green
C) Yellow
D) None of the above
A) Blue
B) Green
C) Yellow
D) None of the above
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
66
The process of ____ is used to verify a user.
A) authentication
B) fingerprinting
C) passwords
D) none of the above
A) authentication
B) fingerprinting
C) passwords
D) none of the above
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
67
When conducting online transactions, use a ____ Web site.
A) firewalled
B) secure
C) unsecure
D) smart
A) firewalled
B) secure
C) unsecure
D) smart
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
68
Which of the following privies added security by requiring two distinct items for verification?
A) Two-factor authentication
B) Two-step authentication
C) Two-factor verification
D) All of the above
A) Two-factor authentication
B) Two-step authentication
C) Two-factor verification
D) All of the above
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
69
Biometric systems include all but which of the following?
A) fingerprint scanners
B) hair scanners
C) facial recognition technology
D) retinal scans
A) fingerprint scanners
B) hair scanners
C) facial recognition technology
D) retinal scans
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
70
A bad example of a strong password is ____.
A) Gatsby1129#45
B) 123RoverDog456
C) Shekels5151$
D) JenniferMarch1st1978
A) Gatsby1129#45
B) 123RoverDog456
C) Shekels5151$
D) JenniferMarch1st1978
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck