Computer Security and Privacy

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What is the primary focus of computer security?

  • Preventing cybercrime and Internet-based crimes
  • Developing technically skilled hackers and crackers
  • Protecting information, hardware, and software from unauthorized use (correct)
  • Protecting individuals and organizations from theft and danger

What is the term for an Internet-based crime?

  • Malware
  • Cybercrime (correct)
  • Computer crime
  • Hacking

What is the term for a program that has malicious intent?

  • Virus
  • Malware (correct)
  • Trojan horse
  • Worm

What is the primary characteristic of a virus?

<p>It attaches and replicates itself to other programs or files (B)</p> Signup and view all the answers

What is the term for technically skilled persons who try to get unauthorized access within a computer system or a network?

<p>Hackers and crackers (C)</p> Signup and view all the answers

What is the term for the unauthorized use of a computer or computer network to commit illegal acts?

<p>Computer crime (D)</p> Signup and view all the answers

What happens to cookies when you visit a website again?

<p>They are used to remember you so you don't need to login again (A)</p> Signup and view all the answers

How are most computer viruses typically transmitted to a user's system?

<p>Via an infected removable storage medium or an email attachment (D)</p> Signup and view all the answers

What is the primary purpose of tracking cookies?

<p>To display targeted advertisements based on browsing history (A)</p> Signup and view all the answers

What is the default format of data sent over the Internet?

<p>Unencrypted plaintext (A)</p> Signup and view all the answers

What is the primary function of antivirus software?

<p>To detect and remove viruses (D)</p> Signup and view all the answers

What is a characteristic of a Trojan horse?

<p>It hides within or looks like a legitimate program (C)</p> Signup and view all the answers

What is the purpose of encryption?

<p>To alter the original representation of information so it cannot be understood by unauthorized users (D)</p> Signup and view all the answers

What is the difference between the 'http' and 'https' protocols?

<p>https is used for sending encrypted data, while http is used for sending unencrypted data (D)</p> Signup and view all the answers

Why is it important to update antivirus software regularly?

<p>To ensure the software is notified of the latest viruses (C)</p> Signup and view all the answers

What happens when you check the 'keep me logged in' box on a website?

<p>The website will remember your login information for next time (A)</p> Signup and view all the answers

What is the effect of a worm on a computer system?

<p>It uses up computing resources and possibly shuts down the system (C)</p> Signup and view all the answers

What is a common tactic used by recent Trojan horses to deceive users?

<p>They invite users to participate in normal ongoing activities (A)</p> Signup and view all the answers

What is the primary purpose of computer ethics guidelines?

<p>To ensure the morally acceptable use of computers in society (B)</p> Signup and view all the answers

Which of the following is a common computer ethics issue involved in intellectual property rights?

<p>Plagiarism (D)</p> Signup and view all the answers

What is the purpose of a firewall in a computer system?

<p>To protect against intruders (D)</p> Signup and view all the answers

What should you do if you receive an email from your bank asking you to change your password for security reasons?

<p>Ignore the email, it's likely a phishing scam (B)</p> Signup and view all the answers

What is the purpose of a CAPTCHA?

<p>To verify human identity (C)</p> Signup and view all the answers

What is a characteristic of a Trojan horse malware?

<p>It cannot replicate itself (B)</p> Signup and view all the answers

What is the primary focus of Chapter Five in the computing skills course?

<p>Computer security and privacy (B)</p> Signup and view all the answers

What is the main objective of protecting against unauthorized access and unauthorized use?

<p>To prevent data loss and ensure authorized access (B)</p> Signup and view all the answers

What is the term for the practice of protecting against unauthorized access and use of computing systems?

<p>Computer security (D)</p> Signup and view all the answers

What is malware, according to the chapter?

<p>A type of malicious program or code (B)</p> Signup and view all the answers

What is the focus of the topic of computer ethics in the chapter?

<p>The responsible use of computing systems and technology (C)</p> Signup and view all the answers

What is the purpose of encryption in computing, according to the chapter?

<p>To protect against unauthorized access and use (C)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Chapter on Privacy and Cybersecurity
24 questions
Basics of Computer Security
42 questions

Basics of Computer Security

FertileApostrophe7291 avatar
FertileApostrophe7291
Sécurité Internet et Cookies
40 questions
Use Quizgecko on...
Browser
Browser