Module 6 Flashcards

1
Q

A _____ is a very short duration of a voltage increase that can be absorbed by a surge protector.

A.
spike

B.
surge

C.
blackout

D.
brownout

A

A. spike
Explanation:
A spike is a sudden and brief increase in voltage. Surge protectors are designed to absorb such spikes to prevent damage to electronic devices. Surges, on the other hand, are more prolonged increases in voltage, while brownouts and blackouts refer to drops or total loss of power​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When creating a strong password _____ is the most important element.

A.
repetitiveness

B.
complexity

C.

length

D.
ability to memorize

A

C. length
Explanation:
The longer a password is, the harder it is for attackers to crack. While complexity is also important (using mixed-case letters, numbers, and symbols), studies have shown that length is the most crucial factor in password strength, as longer passwords take exponentially more time to break​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Wi-Fi Protected Access 2 (WPA2) Personal encrypts wireless data transmissions and limits who can access the Wi-Fi network.

True
False

A

True
Explanation:
WPA2 uses encryption protocols (such as AES) to protect wireless data from interception and requires authentication to restrict access to the network, ensuring only authorized users can connect​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

_____ is the process of “scrambling” information in such a way that it cannot be read unless the user possesses the “key.”

A.
Certification

B.
Decryption

C.
Digital signing

D.
Encryption

A

D. Encryption
Explanation:
Encryption converts readable data into an unreadable format to protect it from unauthorized access. The encrypted data can only be decrypted with the correct key, ensuring data security​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You have the right to see your credit information.

True
False

A

True
Explanation:
Consumers are legally entitled to access their credit reports from credit bureaus to ensure accuracy and detect fraudulent activities. This transparency is part of consumer protection laws in many countries​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is not a web browser setting for managing cookies?

A.
Have all cookies automatically expire after 45 days.

B.
Make exceptions for specific websites.

C.
Accept or deny cookies.

D.
Delete all cookies when the web browser is closed.

A

A. Have all cookies automatically expire after 45 days.
Explanation:
Web browsers do not offer the option to set a fixed expiration time for cookies globally (like 45 days). However, browsers allow users to manage cookies by accepting, denying, deleting, or making exceptions for specific websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Each of the following is a factor that causes repetitive strain injury (RSI) except _____.

A.
lack of restful sleep

B.
improper technique

C.
uninterrupted intensity

D.
repetitive activity

A

A. lack of restful sleep
Explanation:
RSI is caused by repetitive activities, improper techniques, and uninterrupted intensity during work. Lack of restful sleep is not a direct cause of RSI, though it may worsen symptoms​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

____ are attackers who want to attack computers but lack the knowledge needed to do so.

A.
Hactivists

B.
Script kiddies

C.
Nation state actors

D.
Cyberterrorists

A

B. Script kiddies
Explanation:
Script kiddies are individuals who use pre-written scripts or tools created by others to carry out attacks because they lack the technical expertise to develop their own attacks​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A worm is a malicious program that uses a computer network to replicate.

True
False

A

True
Explanation:
A worm is a type of malware that spreads by replicating itself across networks without requiring human intervention, potentially causing widespread harm to systems and networks​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly