Filters
Question type

Study Flashcards

In which of the following situations would you find a data backup helpful?


A) when a slow Internet connection is available
B) during a natural disaster because a data backup provides a copy of previous data
C) if there has been a software malfunction,because then a data backup can restore a previous version
D) if a data backup overwrites current data,so you can correct user error

Correct Answer

verifed

verified

Emma downloaded a new game from an unfamiliar website.A few days later,Emma realized her system had been hacked and her credit card numbers were stolen.Without Emma knowing,what type of malware might she have downloaded to her computer?


A) A worm
B) A Trojan
C) Spam
D) Ransomware

Correct Answer

verifed

verified

Frank thinks he has been a victim of identity theft.Which of the following scenarios might have led him to that conclusion?


A) A new bank account has been opened in his name in a city where he does not live.
B) He found out he owns a new car,but he never actually bought one.
C) There are charges on his credit card for a ski trip in Colorado and he has never been to Colorado.
D) He received a letter from a bankruptcy court regarding his claim that he never filed.

Correct Answer

verifed

verified

You are watching the news and learn that there has been a security breach of credit card information at a large department store.The news report also states that the same company has had recent layoffs.The report says that the company is looking into whether or not the breach was done by an insider.Why would the company investigate the possibility of the breach being from an insider?


A) Because insiders like to cause disruption and panic among citizens.
B) Because insiders create threats after incidents at their places of employment.
C) Because insiders change contents to make a political statement.
D) Because insiders lack the knowledge of computers and networks to perform this task.

Correct Answer

verifed

verified

How is the environment impacted by computers being thrown away in landfills?


A) Data miners are digging up landfills looking for gold and platinum.
B) The lead and mercury is seeping into the ground and water supply.
C) The copper is creating fire dangers and explosive possibilities.
D) The e-waste is increasing because more people are choosing to recycle.

Correct Answer

verifed

verified

How can you protect your information when using social media?


A) Make sure you have your credit or debit card linked to your social media account.
B) Use the same password and username for your social media that you use for your online banking account.
C) Have your security information marked public on your social media account.
D) Accept friend requests from people you want to be friends with.

Correct Answer

verifed

verified

Cassidy is a medical assistant in a hospital and has access to many medical files.When she brings patients to the examining room,she can be observed swiping a card,typing in a password,and staring into what appears to be a camera,all attached to the computer.After completing her check-in,Cassidy leaves the patient in the examining room waiting on the doctor.It is important that she logs out of the system so the patient does not have access to the information stored in the hospital's database.Based on Cassidy's actions what systems do you think the hospital has in place to protect the patient medical records?


A) Digital certificates
B) Two factor authentication
C) Biometrics
D) Encryption

Correct Answer

verifed

verified

To protect your information and help you to remember passwords,use your social media account login information to log into another site.

Correct Answer

verifed

verified

After Penny broke up with her boyfriend,he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating.He even lied about their breakup,creating rumors about her behavior.Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated.Penny is a victim of ________.


A) cyberstalking
B) cyberbullying
C) social engineering
D) data mining

Correct Answer

verifed

verified

Choose the strongest password.


A) Test1test2test3
B) colorbluesky
C) Welcome123
D) H@veAGr3atDaY!

Correct Answer

verifed

verified

Social-networking sites have a history of providing tight security and giving users a clear understanding of how security features work.

Correct Answer

verifed

verified

Isabel received a message on her computer that appeared to be from the FBI.It informed her that her computer has been locked and she would need to pay a fee to retrieve her data.How would you describe what is happening?


A) A hacker is trying to put a Trojan on her computer.
B) A worm has infected her computer and she needs to unplug her device.
C) It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.
D) Nothing has happened and the message is fine to ignore since she has not been home all day and her computer has not been turned on until now.

Correct Answer

verifed

verified

Siobhan has recently opened a Facebook account and as a new user,is posting frequently and accepting many friend requests.You see a post about an upcoming trip and also notice that her profile is open to the public.How can you help Siobhan navigate this new world of social-networking?


A) Tell her to be cautious about what information she posts.
B) Tell her to allow anyone who "friends" her view her information.
C) Show her how to view the security settings.
D) Show her what information the people she has accepted as friends can view.

Correct Answer

verifed

verified

Technology can lead to all of the following behavioral risks EXCEPT _____.


A) social withdrawal
B) depression and anxiety
C) a sedentary lifestyle
D) higher satisfaction with life

Correct Answer

verifed

verified

In terms of privacy,which of the following is a best practice?


A) Saving your personal information as an email draft
B) Keeping your Social Security number hidden in a locked box in your home
C) Posting your location on social media
D) Throwing away old bank statements that are more than three months old

Correct Answer

verifed

verified

Which of the following is a characteristic of a strong password?


A) A short phrase
B) numbers in a series
C) letters,numbers,and symbols
D) personal information

Correct Answer

verifed

verified

You can configure your wireless router to protect your devices in all of the following ways EXCEPT ____.


A) creating a strong password to access the router
B) naming your router something you'll remember,like your street address
C) turning off remote management to the device
D) utilizing guest access when needed and turning it off when guests leave

Correct Answer

verifed

verified

To prevent a laptop from being stolen,you can use a timelock device.

Correct Answer

verifed

verified

You can monitor and protect your financial data in all of the following ways EXCEPT _____.


A) Being cautious about what information you post on social networking sites.
B) Requesting a credit report and freezing your credit.
C) Querying unfamiliar purchases found on your bank statements.
D) Throwing financial documents older than three months in the trash.

Correct Answer

verifed

verified

What would a password manager allow you to do?


A) Test your memorization skills.
B) Create and store multiple strong passwords.
C) Make sure you do not repeat passwords on similar accounts.
D) Prevent you from using birthdays in your passwords.

Correct Answer

verifed

verified

Showing 21 - 40 of 40

Related Exams

Show Answer