Computer Security and Privacy

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What is the primary focus of computer security?

  • Preventing cybercrime and Internet-based crimes
  • Developing technically skilled hackers and crackers
  • Protecting information, hardware, and software from unauthorized use (correct)
  • Protecting individuals and organizations from theft and danger

What is the term for an Internet-based crime?

  • Malware
  • Cybercrime (correct)
  • Computer crime
  • Hacking

What is the term for a program that has malicious intent?

  • Virus
  • Malware (correct)
  • Trojan horse
  • Worm

What is the primary characteristic of a virus?

<p>It attaches and replicates itself to other programs or files (B)</p>
Signup and view all the answers

What is the term for technically skilled persons who try to get unauthorized access within a computer system or a network?

<p>Hackers and crackers (C)</p>
Signup and view all the answers

What is the term for the unauthorized use of a computer or computer network to commit illegal acts?

<p>Computer crime (D)</p>
Signup and view all the answers

What happens to cookies when you visit a website again?

<p>They are used to remember you so you don't need to login again (A)</p>
Signup and view all the answers

How are most computer viruses typically transmitted to a user's system?

<p>Via an infected removable storage medium or an email attachment (D)</p>
Signup and view all the answers

What is the primary purpose of tracking cookies?

<p>To display targeted advertisements based on browsing history (A)</p>
Signup and view all the answers

What is the default format of data sent over the Internet?

<p>Unencrypted plaintext (A)</p>
Signup and view all the answers

What is the primary function of antivirus software?

<p>To detect and remove viruses (D)</p>
Signup and view all the answers

What is a characteristic of a Trojan horse?

<p>It hides within or looks like a legitimate program (C)</p>
Signup and view all the answers

What is the purpose of encryption?

<p>To alter the original representation of information so it cannot be understood by unauthorized users (D)</p>
Signup and view all the answers

What is the difference between the 'http' and 'https' protocols?

<p>https is used for sending encrypted data, while http is used for sending unencrypted data (D)</p>
Signup and view all the answers

Why is it important to update antivirus software regularly?

<p>To ensure the software is notified of the latest viruses (C)</p>
Signup and view all the answers

What happens when you check the 'keep me logged in' box on a website?

<p>The website will remember your login information for next time (A)</p>
Signup and view all the answers

What is the effect of a worm on a computer system?

<p>It uses up computing resources and possibly shuts down the system (C)</p>
Signup and view all the answers

What is a common tactic used by recent Trojan horses to deceive users?

<p>They invite users to participate in normal ongoing activities (A)</p>
Signup and view all the answers

What is the primary purpose of computer ethics guidelines?

<p>To ensure the morally acceptable use of computers in society (B)</p>
Signup and view all the answers

Which of the following is a common computer ethics issue involved in intellectual property rights?

<p>Plagiarism (D)</p>
Signup and view all the answers

What is the purpose of a firewall in a computer system?

<p>To protect against intruders (D)</p>
Signup and view all the answers

What should you do if you receive an email from your bank asking you to change your password for security reasons?

<p>Ignore the email, it's likely a phishing scam (B)</p>
Signup and view all the answers

What is the purpose of a CAPTCHA?

<p>To verify human identity (C)</p>
Signup and view all the answers

What is a characteristic of a Trojan horse malware?

<p>It cannot replicate itself (B)</p>
Signup and view all the answers

What is the primary focus of Chapter Five in the computing skills course?

<p>Computer security and privacy (B)</p>
Signup and view all the answers

What is the main objective of protecting against unauthorized access and unauthorized use?

<p>To prevent data loss and ensure authorized access (B)</p>
Signup and view all the answers

What is the term for the practice of protecting against unauthorized access and use of computing systems?

<p>Computer security (D)</p>
Signup and view all the answers

What is malware, according to the chapter?

<p>A type of malicious program or code (B)</p>
Signup and view all the answers

What is the focus of the topic of computer ethics in the chapter?

<p>The responsible use of computing systems and technology (C)</p>
Signup and view all the answers

What is the purpose of encryption in computing, according to the chapter?

<p>To protect against unauthorized access and use (C)</p>
Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Computer Security & Privacy - Ch. 7
10 questions

Computer Security & Privacy - Ch. 7

SensationalChrysoprase468 avatar
SensationalChrysoprase468
Basics of Computer Security
42 questions

Basics of Computer Security

FertileApostrophe7291 avatar
FertileApostrophe7291
Sécurité Internet et Cookies
40 questions
Use Quizgecko on...
Browser
Browser