Module 6 Exam Flashcards

1
Q

What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?

A

phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________.

A

cyberbullying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What device protects a computer from electrical spikes and surges?

A

surge protector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening?

A

ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In terms of privacy, which of the following is a best practice?

A

Keeping your Social Security number hidden in a locked box in your home

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The ______ in flat panel fluorescent backlights is difficult to recycle.

A

mercury

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Zelda has been a victim of cybersecurity attacks twice, losing considerable sums of money each time. How can she ensure that she does not become a victim to it again? Select all that apply.

A

She should try and carry her own WiFi, or create a hotspot using her phone, and avoid unprotected public WiFi networks.
She should absolutely not share passwords or account info with anyone.
She should configure all her gadgets to download and install security updates automatically.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

By recycling electronics, you can help _____.

A

keep toxic materials out of the water we drink

preserve limited resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

To use a security cable with a smartphone, you may need to add a(n) _____ing ______

A

locking plate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Some web browsers do not support plug-ins. Yes/No

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Before donating a computer, you should _____.

A

securely remove your personal information

remove the power supply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

To limit the potential damage from power spikes, use a(n) _______ _________

A

surge suppressor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Prolonged typing without sufficient breaks can NOT cause nerve damage (YES/NO)

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The goals of email spoofing include luring the user into _______

A

logging into a legitimate banking site

downloading malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Full disk encryption protects a ______ or _____

A

drive, device