Hackers/Viruses
Online Annoyances/ Social Engineering
Restricting Access to Your Digital Assets
Keeping Your Data Safe
Protecting Your Physical Computing Assets
100

Any criminal action perpetrated primarily through the use of a computer.

A) Identity Theft

B) Cybercrime

C) Hacker

B) Cybercrime

100

What is Spam?

is unwanted junk email sent by companies that obtain your email by purchasing it from lists or with online soft-ware that searches for emails

100

software program or hardware device designed to protect computers from hackers

A) Antivirus software

B) Firewall

C) Anti Hacker

B) Firewall

100

What information should I never share on websites and why?

Social Security number, phone number, date of birth, and street address are four key pieces of information that identity thieves use to steal an identity. This information should never be shared in a public area on any website.

100

What are surge protectors? 

 is a device that protects your computer against power surges

200

What is a Trojan horse?

A computer program that appears to be something useful pr desirable ( such as a game or a screen saver), but at the same time does something malicious in the background without the user's knowledge.

200

unwanted piggy-back software that usually downloads with other software you install from the Internet and runs in the background of your system 

A) Spyware 

B) Adware 

C) Spam 

A) Spyware

200

Can firewalls protect you from hackers?


Firewalls are designed to restrict access to a network and its computers. Firewalls protect you in two major ways: (1) by blocking access to logical ports, and (2) by keeping your computer’s network address secure.

200

Incremental (partial) backups are for

A) Full backups

B) Image backups

C) nothing

A) Full backups

200

What is a power surge?

Power surges occur when electric current is supplied in excess of normal voltage. Old or faulty wiring, downed power lines, malfunctions at electric company substations, and lightning strikes can all cause power surges.

300

Black-hat hacker vs White-hat hacker 

BH: A hacker who uses his or her knowledge to destroy information or for illegal gain

WH:(ethical hacker): A hacker who breaks into systems just for the challenge of it ( and who doesn't wish to steal or wreak havoc on the systems). Such hackers tout themselves as experts who are performing a needed service for society by helping companies realize the vulnerabilities that exist in their systems.

300

Malware Vs Adware

Malware is software that has malicious intent. The three main types of malware include adware, spyware & viruses

Adware is software that displays sponsored advertisement in a pop-up or web browser

300

Why is antivirus software important if a computer already has it?

This offers built-in virus protection but does not get as strong ratings as many third-party products. Your new system will probably also come with a trial version of a particular company’s antivirus program. That software is free only for a limited time, usually 90 or 180 days. After that, you have to pay to upgrade to the full version of the product if you decide you like it. Before you consider paying for the upgrade though, check with your Internet service provider. Many include free antivirus software with your monthly service plan.

300

Files that are used in the running of software programs and that do not store data 

A) Cookies

B) Data files

C) Program files

C) Program Files

300

The main security concerns with mobile devices are:

A) Keeping them from being stolen

B) Keeping data secure in case they are stolen

C) Finding a device if it is stolen

D) All of these

D) All of these

400

A program that attempts to travel between systems through network connections to spread infections. 

A) Script 

B) Encryption virus 

C) Worm 

C) Worm

400

What is Social engineering?

Is any technique that uses social skills to create human interaction that tempts individuals to reveal sensitive information.

400

What makes a strong password? 

-Don’t use easily deduced components related to your life, such as parts of your name, your pet’s name, your street address, or the name of the website or institution for which you’re creating the password (e.g., don’t use “Citibank” for your online banking password).

-Use a password that’s at least 14 characters long. Longer passwords are more difficult to deduce. Consider using a passphrase that is even longer.

-Don’t use words found in the dictionary.

-Use a mix of upper- and lowercase letters, numbers, and symbols (such as # or %).

-Never tell anyone your password or write it down in a place where others might see it, like in your wallet or a sticky note on your computer screen.

-Change your passwords on a regular basis, such as monthly or quarterly. Your school or your employer probably requires you to change your password regularly. This is also a good idea for your personal passwords.

-Don’t use the same password for every account you have.

-If you have trouble thinking of secure passwords, there are many password generators available for free, such as the Strong Password Generator

400

Image Backup Vs Full Backup

Full Backup- A file that encompasses all files on a computer Irregardless if they have been changed since the last backup.

Image Backup- A copy of an entire computer system, created for restoration purposes

400

During an electrical storm how can electronic devices achieve absolute protection?

By unplugging electronics 

500

What is Polymorphic? 

A) Changes its code to avoid detection. 

B) Is designed to infect multiple file types to fool antivirus software that is looking for it.

C) Temporarily erase their code from the files where they reside and then hide in the active memory of the computer.

A) Changes its code to avoid detection. Most polymorphic viruses infect a distinct type of file.

500

Lures Internet users to reveal personal information such as credit card numbers, Social Security numbers, or passwords that could lead to identity theft.

A) Pharming

B) Phishing 

C) Phat farm

B) Phishing - Lures Internet users to reveal personal information such as credit card numbers, Social Security numbers, or passwords that could lead to identity theft.

500

What is a Biometric Authentication Device?

Device that uses some unique characteristic of human biology to identify authorized users

500

What are ways you can protect yourself when using facebook? 

change your privacy settings in your profile from some of the default options. 

Don't make personal information available to the public, although this is a default setting for some items in Facebook. 

set most of the options in your profile’s Basic Information section to Friends or to Only Me because, presumably, these are personal details you should wish to share only with friends.

In the Contact Information section, restricting this information only to friends or to yourself is imperative. You don’t want scammers contacting you via e-mail or snail mail and trying to trick you into revealing sensitive information.

500

what other devices need to be connected to a surge protector?

All electronics

M
e
n
u