Filters
Question type

Study Flashcards

You have been asked to create an authentication security plan for your company. Which of the following components would you incorporate to ensure your company is secured?


A) Have the computer identify blood type and oxygen levels.
B) Use biometric security that uses characteristics of your face, hands, or eyes.
C) Use two factor authentication where the user enters the password and a code sent his or her cell phone.
D) Use a password manager to create unique strong passwords.

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

How can you protect a computer from electrical spikes and surges?


A) Use a surge protector.
B) Unplug the computer when it is not in use.
C) Use an uninterruptible power supply.
D) Use a cable lock.

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Frank thinks he has been a victim of identity theft. Which of the following scenarios might have led him to that conclusion?


A) A new bank account has been opened in his name in a city where he does not live.
B) He found out he owns a new car, but he never actually bought one.
C) There are charges on his credit card for a ski trip in Colorado and he has never been to Colorado.
D) He received a letter from a bankruptcy court regarding his claim that he never filed.

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Why is it not safe to connect to public Wi-Fi networks?


A) Because these networks are rarely protected.
B) Because an attacker may have set up an evil twin.
C) Because the connection is often too slow.
D) Because it can weaken your own Wi-Fi wireless router.

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

Siobhan has recently opened a Facebook account and as a new user, is posting frequently and accepting many friend requests. You see a post about an upcoming trip and also notice that her profile is open to the public. How can you help Siobhan navigate this new world of social-networking?


A) Tell her to be cautious about what information she posts.
B) Tell her to allow anyone who "friends" her view her information.
C) Show her how to view the security settings.
D) Show her what information the people she has accepted as friends can view.

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Your Facebook profile is private so there is no need to worry about your boss ever seeing your posts such as your Spring Break pictures.

A) True
B) False

Correct Answer

verifed

verified

False

How is the environment impacted by computers being thrown away in landfills?


A) Data miners are digging up landfills looking for gold and platinum.
B) The lead and mercury is seeping into the ground and water supply.
C) The copper is creating fire dangers and explosive possibilities.
D) The e-waste is increasing because more people are choosing to recycle.

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

Which of the following statements about browser security settings are true?


A) You can choose which sites run pop-ups.
B) Your accumulated web history is stored forever.
C) You can deny cookies.
D) Sites can-- be allowed or blocked from running scripts.

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

A Trojan is a malicious program that uses a computer network to replicate.

A) True
B) False

Correct Answer

verifed

verified

How could an online attacker use your online profile to gather information about you to steal your identity?


A) Use your profile pictures to figure out where you are.
B) Pose as a long lost relative to become one of your friends.
C) Use your posts to figure out answers to possible security questions.
D) Post a message that appears to be from a friend warning about a security breach and encouraging you to change your account information.

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one?


A) His phone can generate an alarm even if it is on mute.
B) He can use remote wiping to retrace the thief's steps.
C) The current location of his phone can be pinpointed on a map through the phone's GPS.
D) If the thief enters an incorrect passcode thee times, then a picture of the thief will be taken and emailed to Marcus.

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

B

In which of the following real-life situations would it be useful to use a digital certificate?


A) if you were submitting a paper to your professor
B) if you were registering for an event
C) if you were emailing a friend
D) if you were signing a rental lease

E) A) and C)
F) All of the above

Correct Answer

verifed

verified

How will you decide which browser security settings to allow and which ones to block?


A) If the browser security setting is from my favorite online retailers, I will accept it because the retailer knows what I like.
B) I will need to review each browser security setting and use my best judgement.
C) If the browser security setting is on a website sent from a friend, I always accept the setting.
D) If the browser security setting has been mentioned on several friends' timelines on Facebook then it must be a good one, so I should do change it on my computer too.

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

B

How can you protect your information when using social media?


A) Make sure you have your credit or debit card linked to your social media account.
B) Use the same password and username for your social media that you use for your online banking account.
C) Have your security information marked public on your social media account.
D) Accept friend requests from people you want to be friends with.

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

You can monitor and protect your financial data in all of the following ways EXCEPT _____.


A) Being cautious about what information you post on social networking sites.
B) Requesting a credit report and freezing your credit.
C) Querying unfamiliar purchases found on your bank statements.
D) Throwing financial documents older than three months in the trash.

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?


A) Cyberbullying
B) Ergonomics
C) Technology addiction
D) Repetitive strain

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

Choose the strongest password.


A) Test1test2test3
B) colorbluesky
C) Welcome123
D) H@veAGr3atDaY!

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?


A) A worm
B) A Trojan
C) Spam
D) Ransomware

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

In terms of privacy, which of the following is a best practice?


A) Saving your personal information as an email draft
B) Keeping your Social Security number hidden in a locked box in your home
C) Posting your location on social media
D) Throwing away old bank statements that are more than three months old

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

With more and more people using technology, what physical health diagnosis is on the rise?


A) cyberstalking
B) cyberbullying
C) repetitive strain injury
D) technology addiction

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

Showing 1 - 20 of 40

Related Exams

Show Answer