Computer Concepts Module 6 Flashcards
39 Questions
100 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

_____ ensures that the person requesting access to a computer is not an imposter.

Authentication

Penny is a victim of ________.

cyberbullying

What systems might the hospital have in place to protect patient medical records?

biometric security

Creating a(n) _____ means copying files from a computer's hard drive and storing them in a remote location.

<p>data backup</p> Signup and view all the answers

What type of malware might Emma have downloaded to her computer?

<p>A Trojan</p> Signup and view all the answers

How can an attacker execute malware through a script?

<p>An attacker can attach a script to a program that you download which then infects your computer.</p> Signup and view all the answers

How can you protect a computer from electrical spikes and surges?

<p>Use a surge protector.</p> Signup and view all the answers

How can you protect personal information gathered by legitimate organizations?

<p>Create a separate email account for receiving information from websites.</p> Signup and view all the answers

How does discarding computers in a landfill affect the environment?

<p>Lead and mercury in computer parts are seeping into the ground and water supply.</p> Signup and view all the answers

How does encryption work?

<p>It scrambles the information until the key is used to unscramble it.</p> Signup and view all the answers

How is a worm different from a Trojan?

<p>A worm spreads through a network, whereas a Trojan hides inside another program.</p> Signup and view all the answers

How will you decide which browser security settings to allow and which ones to block?

<p>I will need to review each browser security setting and use my best judgement.</p> Signup and view all the answers

In terms of privacy, which of the following is a best practice?

<p>Keeping your Social Security number hidden in a locked box in your home.</p> Signup and view all the answers

In which of the following situations is a digital certificate useful?

<p>You are signing a rental lease.</p> Signup and view all the answers

What is happening when Isabel receives a message saying her computer has been locked?

<p>It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.</p> Signup and view all the answers

Which security feature should help Marcus locate his stolen cell phone EXCEPT which one?

<p>He can use remote wiping to retrace the thief's steps.</p> Signup and view all the answers

What can you tell Siobhan to help her use social networking safely?

<p>Be cautious about what information she posts.</p> Signup and view all the answers

Technology can lead to all of the following behavioral risks EXCEPT _____.

<p>higher satisfaction with life</p> Signup and view all the answers

Why should the store investigate the possibility of a security breach being from an insider?

<p>Because insiders sometimes create threats after incidents at their places of employment.</p> Signup and view all the answers

There are various risks from attacks on Wi-Fi networks. These include all of the following EXCEPT _____.

<p>creating malware</p> Signup and view all the answers

What is a digital certificate?

<p>Technology used to verify a user's identity.</p> Signup and view all the answers

What is it called when an attacker convinces you to enter personal information at an imposter website?

<p>phishing</p> Signup and view all the answers

What type of security requires something you know and something you have that no one else has?

<p>two factor authentication</p> Signup and view all the answers

What would a password manager allow you to do?

<p>Create and store multiple strong passwords.</p> Signup and view all the answers

Which is a first step to deter thieves from accessing your financial information?

<p>Do not provide personal information over the phone or through email.</p> Signup and view all the answers

Which of the following forms of identity theft involves posing as a legitimate researcher?

<p>Pretexting</p> Signup and view all the answers

Which of the following is a characteristic of a strong password?

<p>letters, numbers, and symbols</p> Signup and view all the answers

Which of the following is the strongest password?

<p>H@veAGr3atDaY!</p> Signup and view all the answers

Which of the following statements about browser security settings is false?

<p>True</p> Signup and view all the answers

Which of the following types of websites typically provides the least security?

<p>True</p> Signup and view all the answers

Which term refers to the science that specifies the design and arrangement of items for efficient and safe interaction?

<p>ergonomics</p> Signup and view all the answers

Why is it not safe to connect to public Wi-Fi networks?

<p>Because these networks are rarely protected.</p> Signup and view all the answers

With more and more people using technology, what physical health diagnosis is on the rise?

<p>repetitive strain injury</p> Signup and view all the answers

You can monitor and protect your financial data in all of the following ways EXCEPT _____.

<p>Requesting a credit report and freezing your credit.</p> Signup and view all the answers

A Trojan is a malicious program that uses a computer network to replicate.

<p>False</p> Signup and view all the answers

Social-networking sites have a history of providing tight security and giving users a clear understanding of how security features work.

<p>False</p> Signup and view all the answers

To prevent a laptop from being stolen, you can use a surge protector.

<p>False</p> Signup and view all the answers

To protect your information and help you to remember passwords, use your social media account login information to log into another site.

<p>False</p> Signup and view all the answers

Your Facebook profile is private so there is no need to worry about your boss ever seeing your posts.

<p>False</p> Signup and view all the answers

Study Notes

Authentication and Cybersecurity

  • Authentication verifies the identity of a user before granting access to a computer system.
  • Cyberbullying involves harassment via electronic means, causing emotional distress to victims.

Medical Data Protection

  • Biometric security (fingerprints, retina scans) secures medical records in hospitals by requiring unique physical characteristics for access.
  • Logging out of systems is crucial to prevent unauthorized access to sensitive information.

Data Management and Malware

  • Data backup involves copying files to a remote location for safekeeping.
  • A Trojan is a type of malware disguised as legitimate software, often downloaded from unsecured websites.
  • Ransomware blocks access to data until a payment is made to the attacker.

Online Safety Practices

  • Surge protectors safeguard computers against electrical spikes and surges.
  • Use a separate email account to limit exposure to spam and potential data breaches.
  • A strong password contains letters, numbers, and symbols, offering enhanced security.

Privacy and Digital Certificates

  • Digital certificates confirm the identity of users in digital transactions, providing an additional layer of security.
  • Phishing is a tactic where attackers impersonate legitimate organizations to gather personal information from victims.

Social Media and Online Behavior

  • Be mindful of personal information posted on social media, as public profiles can lead to privacy risks.
  • Strong passwords and two-factor authentication provide additional security for online accounts.

Security Risks in Technology and Networks

  • Security breaches can stem from insiders, especially after employment changes or layoffs.
  • Connecting to public Wi-Fi can expose users to threats, as such networks are often unprotected.

Ergonomics and Health

  • Ergonomics focuses on the safe and efficient design of workspaces and equipment to prevent injuries.
  • Repetitive strain injury has become prevalent as technology use increases, indicating a need for proper ergonomics.

Identity Theft Methods

  • Pretexting is a form of identity theft where impersonators solicit personal information under false pretenses.
  • To prevent identity theft, avoid sharing personal information over the phone or through email without verification.

Browser Security and Online Behavior

  • Browser settings can be adjusted for security, and users should regularly review these settings to protect their data.
  • Social media sites generally provide the least security compared to other types of websites.

False Statements to Note

  • It is incorrect to say a Trojan replicates through a network; that is a characteristic of worms.
  • The belief that using a surge protector can prevent laptop theft is false; physical locks and secure storage are more effective.

General Security Measures

  • Monitor financial data closely and consider options like credit freezes to deter identity theft.
  • Understanding and utilizing security features on social networks is essential for maintaining privacy.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

Test your knowledge of key computer concepts with these flashcards from Module 6. Each card covers important terms and scenarios related to computer security and digital interactions. Perfect for review and exam preparation.

More Like This

IT System Security and Authentication
28 questions
Authentication in Electronic Communications
10 questions
Computer Security and Resource Management
28 questions
Use Quizgecko on...
Browser
Browser