ITE 115 Exam 2 Flashcards
26 Questions
100 Views

ITE 115 Exam 2 Flashcards

Created by
@StatuesquePrimrose

Questions and Answers

What is Module 6?

  • A section of a course (correct)
  • A software application
  • A chapter in a textbook (correct)
  • A programming language
  • How can you protect a computer from electrical spikes and surges?

    Use a surge protector.

    How will you decide which browser security settings to allow and which ones to block?

    I will need to review each browser security setting and use my best judgement.

    What is a digital certificate?

    <p>Technology used to verify a user's identity.</p> Signup and view all the answers

    _____ ensures that the person requesting access to a computer is not an imposter.

    <p>Authentication</p> Signup and view all the answers

    Based on Cassidy's actions, what systems do you think the hospital has in place to protect the patient medical records?

    <p>Biometrics</p> Signup and view all the answers

    In which of the following situations is a digital certificate useful?

    <p>You are signing a rental lease.</p> Signup and view all the answers

    You can configure your wireless router to protect your devices in all of the following ways EXCEPT ____.

    <p>naming your router something you'll remember, like your street address</p> Signup and view all the answers

    Which of the following statements about browser security settings is false?

    <p>You must keep your accumulated web history as long as you use the browser.</p> Signup and view all the answers

    Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?

    <p>Ergonomics</p> Signup and view all the answers

    What is a first step to deter thieves from accessing your financial information?

    <p>Do not provide personal information over the phone or through email.</p> Signup and view all the answers

    Which of the following types of websites typically provides the least security?

    <p>Social media sites</p> Signup and view all the answers

    With more and more people using technology, what physical health diagnosis is on the rise?

    <p>Repetitive strain injury</p> Signup and view all the answers

    Creating a(n) _____ means copying files from a computer's hard drive and storing them in a remote location.

    <p>data backup</p> Signup and view all the answers

    You can monitor and protect your financial data in all of the following ways EXCEPT _____.

    <p>Storing financial information in an unsent email message.</p> Signup and view all the answers

    How can an attacker execute malware through a script?

    <p>A script can run a series of instructions to download and run malware.</p> Signup and view all the answers

    What would a password manager allow you to do?

    <p>Create and store multiple strong passwords.</p> Signup and view all the answers

    Why is it not safe to connect to public Wi-Fi networks?

    <p>Because these networks are rarely protected.</p> Signup and view all the answers

    How is a worm different from a Trojan?

    <p>A worm spreads through a network, whereas a Trojan hides inside another program.</p> Signup and view all the answers

    Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one?

    <p>Remote tracking to retrace the thief's steps</p> Signup and view all the answers

    How does discarding computers in a landfill affect the environment?

    <p>Lead and mercury in computer parts are seeping into the ground and water supply.</p> Signup and view all the answers

    How does encryption work?

    <p>It scrambles the information until the key is used to unscramble it.</p> Signup and view all the answers

    In terms of privacy, which of the following is a best practice?

    <p>Keeping your Social Security number hidden in a locked box in your home.</p> Signup and view all the answers

    What type of malware might Emma have downloaded to her computer?

    <p>Trojan</p> Signup and view all the answers

    Which of the following is the strongest password?

    <p>H@veAGr3atDaY!</p> Signup and view all the answers

    Which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information?

    <p>Pretexting</p> Signup and view all the answers

    Study Notes

    Computer Protection and Security

    • Surge protectors guard against electrical spikes and surges by absorbing changes before they reach computer equipment.
    • Decisions on browser security settings should rely on individual judgement and careful evaluation of each setting's impact on computer access.
    • Authentication verifies user identity; methods include strong passwords, biometrics, and two-factor authentication.

    Digital Certificates and Website Security

    • Digital certificates verify user identity through a key signed by a trusted authority, often utilized in legal agreements, like rental leases.
    • Configuring a wireless router involves setting security measures, while naming it can't effectively protect devices.
    • Browser security settings allow managing web history, cookies, and scripts to enhance online safety.

    Ergonomics and Health Considerations

    • Ergonomics focuses on design and arrangement for efficient human-computer interaction, promoting user comfort and safety.
    • Rising diagnoses linked to technology use include repetitive strain injury, affecting muscles and tendons due to prolonged device usage.

    Data Management and Cybersecurity

    • Data backups are vital for recovering information from hardware failures, user errors, or disasters, providing a safety net for important files.
    • Personal information should not be shared over the phone or email to deter identity theft.

    Malware and Online Threats

    • Worms propagate through networks, while Trojans disguise themselves as legitimate software but perform malicious actions once installed.
    • Public Wi-Fi networks pose significant risks due to lack of protection and potential threats like evil twin setups.

    Environmental Impact of Technology

    • Disposing of computers in landfills contributes to environmental hazards as toxic substances like lead and mercury leach into soil and water supplies.

    Encryption and Privacy

    • Encryption protects information by scrambling it, making it inaccessible without the corresponding key to decrypt it.
    • Best privacy practices include securing sensitive information, like Social Security numbers, in a locked box to prevent unauthorized access.

    Identity Theft Techniques

    • Pretexting is a method of identity theft where individuals pose as legitimate figures to solicit personal information from victims.

    Strong Password Practices

    • Crafting strong passwords involves using longer combinations of letters, numbers, and symbols to enhance security, exemplified by “H@veAGr3atDaY!”.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge with these flashcards for ITE 115 Exam 2. This set covers important topics from Module 6, including computer protection methods and browsing decisions. Perfect for reviewing key concepts and preparing for your exam.

    More Quizzes Like This

    Use Quizgecko on...
    Browser
    Browser