Mod 4 Quiz Flashcards

1
Q

What is spyware?

A

Software that records information about a PC and its users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a lunchtime attack?

A

An attack that happens during lunch breaks when devices are left unattended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the primary function of antivirus software?

A

To identify and stop harmful attacks on your computer or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a pattern lock?

A

A predefined design on a touchscreen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What criteria does a simple firewall use besides source and destination?

A

Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What should you do if a virus spreads over a network?

A

Disconnect the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the main reason for testing patches before deploying them?

A

To ensure they do not cause problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which type of user account can do anything they want on the entire computer system?

A

Administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the primary function of a firewall?

A

To filter network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is ransomware?

A

Malware that locks up a computer and demands money

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why might your account get flagged when logging in from a different location?

A

Because logging in from an unfamiliar location looks suspicious.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does a malware worm spread?

A

By replicating itself over a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the primary goal of the “Protect” function in the NIST Cybersecurity Framework?

A

To develop and operate IT assets securely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What technology is used for location tracking?

A

GPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is a sign of a potentially fake email?

A

The email contains spelling or grammar mistakes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly