A) Have the computer identify blood type and oxygen levels.
B) Use biometric security that uses characteristics of your face, hands, or eyes.
C) Use two factor authentication where the user enters the password and a code sent his or her cell phone.
D) Use a password manager to create unique strong passwords.
Correct Answer
verified
Multiple Choice
A) Use a surge protector.
B) Unplug the computer when it is not in use.
C) Use an uninterruptible power supply.
D) Use a cable lock.
Correct Answer
verified
Multiple Choice
A) A new bank account has been opened in his name in a city where he does not live.
B) He found out he owns a new car, but he never actually bought one.
C) There are charges on his credit card for a ski trip in Colorado and he has never been to Colorado.
D) He received a letter from a bankruptcy court regarding his claim that he never filed.
Correct Answer
verified
Multiple Choice
A) Because these networks are rarely protected.
B) Because an attacker may have set up an evil twin.
C) Because the connection is often too slow.
D) Because it can weaken your own Wi-Fi wireless router.
Correct Answer
verified
Multiple Choice
A) Tell her to be cautious about what information she posts.
B) Tell her to allow anyone who "friends" her view her information.
C) Show her how to view the security settings.
D) Show her what information the people she has accepted as friends can view.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Data miners are digging up landfills looking for gold and platinum.
B) The lead and mercury is seeping into the ground and water supply.
C) The copper is creating fire dangers and explosive possibilities.
D) The e-waste is increasing because more people are choosing to recycle.
Correct Answer
verified
Multiple Choice
A) You can choose which sites run pop-ups.
B) Your accumulated web history is stored forever.
C) You can deny cookies.
D) Sites can-- be allowed or blocked from running scripts.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Use your profile pictures to figure out where you are.
B) Pose as a long lost relative to become one of your friends.
C) Use your posts to figure out answers to possible security questions.
D) Post a message that appears to be from a friend warning about a security breach and encouraging you to change your account information.
Correct Answer
verified
Multiple Choice
A) His phone can generate an alarm even if it is on mute.
B) He can use remote wiping to retrace the thief's steps.
C) The current location of his phone can be pinpointed on a map through the phone's GPS.
D) If the thief enters an incorrect passcode thee times, then a picture of the thief will be taken and emailed to Marcus.
Correct Answer
verified
Multiple Choice
A) if you were submitting a paper to your professor
B) if you were registering for an event
C) if you were emailing a friend
D) if you were signing a rental lease
Correct Answer
verified
Multiple Choice
A) If the browser security setting is from my favorite online retailers, I will accept it because the retailer knows what I like.
B) I will need to review each browser security setting and use my best judgement.
C) If the browser security setting is on a website sent from a friend, I always accept the setting.
D) If the browser security setting has been mentioned on several friends' timelines on Facebook then it must be a good one, so I should do change it on my computer too.
Correct Answer
verified
Multiple Choice
A) Make sure you have your credit or debit card linked to your social media account.
B) Use the same password and username for your social media that you use for your online banking account.
C) Have your security information marked public on your social media account.
D) Accept friend requests from people you want to be friends with.
Correct Answer
verified
Multiple Choice
A) Being cautious about what information you post on social networking sites.
B) Requesting a credit report and freezing your credit.
C) Querying unfamiliar purchases found on your bank statements.
D) Throwing financial documents older than three months in the trash.
Correct Answer
verified
Multiple Choice
A) Cyberbullying
B) Ergonomics
C) Technology addiction
D) Repetitive strain
Correct Answer
verified
Multiple Choice
A) Test1test2test3
B) colorbluesky
C) Welcome123
D) H@veAGr3atDaY!
Correct Answer
verified
Multiple Choice
A) A worm
B) A Trojan
C) Spam
D) Ransomware
Correct Answer
verified
Multiple Choice
A) Saving your personal information as an email draft
B) Keeping your Social Security number hidden in a locked box in your home
C) Posting your location on social media
D) Throwing away old bank statements that are more than three months old
Correct Answer
verified
Multiple Choice
A) cyberstalking
B) cyberbullying
C) repetitive strain injury
D) technology addiction
Correct Answer
verified
Showing 1 - 20 of 40
Related Exams