To protect your information and help you to remember passwords, use your social media account login information to log into another site. (True/False)
False
How does encryption work?
- - -
1. It scrambles the information until the key is used to unscramble it.
2. It protects data on your hard drive, but once you choose to send it to someone, it is no longer protected.
3. It is a key that you insert into your computer to unlock your saved files.
4. It is what happens when you download attachments from your email.
1. It scrambles the information until the key is used to unscramble it.
When you think about your typical day, which of the following tasks would NOT involve technology?
- - -
1. Running three miles with the dog.
2. Responding to your child's teacher's email.
3. Using an app to order your coffee.
4. Turning off your alarm on your phone.
1. Running three miles with the dog.
A trojan is a malicious program that uses a computer network to replicate. (True/False)
False
A worm is a malicious program that uses a computer network to replicate.
How is the environment impacted by computers being thrown away in landfills?
- - -
1. The lead and mercury is seeping into the ground and water supply.
2. The e-waste is increasing because more people are choosing to recycle.
3. Data miners are digging up landfills looking for gold and platinum.
4. The cooper is creating fire dangers and explosive possibilities.
1. The lead and mercury is seeping into the ground and water supply.
Choose the strongest password.
- - -
1. Test1test2test3
2. colorbluesky
3. Welcome123
4. H@veAGr3atDay!
4. H@veAGr3atDay!
All of the following are security features that can help locate a stolen phone EXCEPT ____.
- - -
1. A failed passcode, three times, will cause a picture of the thief to be taken and emailed to the owner of the phone.
2. The phone can generate and alarm even if it is on mute.
3. The owner can use remote wiping to retrace the thief's steps.
4. The current location of the phone can be pinpointed on a map through the phone's GPS.
3. The owner can use remote wiping to retrace the thief's steps.
Technology is used today in manufacturing, health care, and the transportation industry, but education has not yet embraced it. (True/False)
False
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?
- - -
1. encryption
2. dumpster diving
3. identity theft
4. phishing
4. phishing
How can you protect a computer from electrical spikes and surges?
- - -
1. Use a cable lock.
2. Use a surge protector.
3. Unplug the computer when it is not in use.
4. Use an uninterruptible power supply.
2. Use a surge protector.
How can you protect your info when using social media?
- - -
1. Accept friend requests from people you want to be friends with.
2. Have your security information marked public on your social media account.
3. Use the same password and username for your social media that you use for your online banking account.
4. Make sure you have your credit or debit card linked to your social media account.
1. Accept friend requests from people you want to be friends with.
Which of the following statements about browser security settings are true? (select all that apply)
- - -
1. You can choose which sites run pop-ups.
2. You can deny cookies.
3. Your accumulated web history is stored forever.
4. Sites can be allowed or blocked from running scripts.
1. You can choose which sites run pop-ups.
2. You can deny cookies.
4. Sites can be allowed or blocked from running scripts.
What technology can be used by people with a hearing disability to listen to a narration?
- - -
1. Read aloud technology
2. MIDI technology
3. Speech recognition
4. Computer-aided technology
3. Speech recognition
How can an online attacker use your online profile to gather information about you to steal your identity?
- - -
1. Use your posts to figure out answers to possible security questions.
2. Post a message that appears to be from a friend warning about a security breach and encouraging you to change your account information.
3. Use your profile pictures to figure out where you are.
4. Pose as a long lost relative to become one of your friends.
1. Use your posts to figure out answers to possible security questions.
In which of the following situations would you find a data backup helpful? (select all that apply)
- - -
1. if a data backup overwrites current data, so you can correct user error
2. during a natural disaster because a data backup provides a copy of previous data
3. when a slow internet connection is available
4. if there has been a software malfunction, because then a data backup can restore a previous version
1. if a data backup overwrites current data, so you can correct user error
2. during a natural disaster because a data backup provides a copy of previous data
4. if there has been a software malfunction, because then a data backup can restore a previous version
In terms of privacy, which of the following is a best practice?
- - -
1. Saving your personal information as an email draft.
2. Posting your location on social media.
3. Keeping your Social Security number hidden in a locked box in you home.
4. Throwing away old bank statements that are more than three months old.
3. Keeping your Social Security number hidden in a locked box in you home.
Which is a first step to deter thieves from accessing your financial information?
- - -
1. Be alert to signs that may indicate unusual activity in an account.
2. Do not provide personal information over the phone or through email.
3. Follow up on calls regarding purchases that were not made.
4. Review financial and billing statements each month carefully.
2. Do not provide personal information over the phone or through email.
Digital assistants like Siri, Cortana, and Alexa are mostly considered to be sophisticated and high-functioning. What technologies do they use to produce clear and accurate results? (select all that apply)
- - -
1. Synthesized speech
2. MIDI technology
3. Speech recognition
4. Artificial Intelligence
1. Synthesized speech
3. Speech recognition
4. Artificial Intelligence
How is a worm different from a Trojan?
- - -
1. A worm gathers information and transmits to a ser, whereas a Trojan hides and then spreads through a network.
2. A worm spreads through a network, whereas a Trojan hides inside another program.
3. A worm prevents a device from functioning until a ransom is paid, whereas a Trojan gathers information and transmits it to another device.
4. A worm reproduces itself on the same computer, whereas a Trojan attempts to spread through the network.
2. A worm spreads through a network, whereas a Trojan hides inside another program.
Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?
- - -
1.Repetitive strain
2. Technology addiction
3. Cyberbullying
4. Ergonomics
4. Ergonomics
Which of the following is a characteristic of a strong password?
- - -
1. a short phrase
2. letter, numbers, and symbols
3. personal information
4. numbers in a series
2. letter, numbers, and symbols
Which of the following website features should make you question its security?
- - -
1. "https in URL.
2. An icon that indicates a secure connection.
3. Absence of a lock icon in the browser window.
4. Requirement to sing in with a username and password.
3. Absence of a lock icon in the browser window.
A video that is shared millions of times over social media in a short period of time is termed to be ____.
- - -
1. fake
2. concurrent
3. viral
4. original
3. viral
Why is it not safe to connect o public Wifi networks? (select all that apply)
- - -
1. Because these networks are rarely protected.
2. Because the connection is often too slow.
3. Because it can weaken your own Wifi wireless router.
4. Because an attacker may have set up an evil twin.
1. Because these networks are rarely protected.
4. Because an attacker may have set up an evil twin.
Technology can lead to all of the following behavioral risks EXCEPT ____.
- - -
1. higher satisfaction with life
2. depression and anxiety
3. a sedentary lifestyle
4. social withdrawal
1. higher satisfaction with life