Protecting your data and privacity Flashcards

1
Q

Which type of technology can prevent malicious software from monitoring user activities, collecting personal information and producing unwanted pop-up ads on a user computer?

(a) Two factor authentication

(b) Password manager

(c) Firewall

(d) Antispyware

A

Antispyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What should you do in order to make sure that people you live with do not have access to your secure data?

(a) Turn on a firewall

(b) Set up password protection

(c) Install antivirus software

(d) Increase the privacy settings on your browser

A

Set up password protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why do IoT devices pose a greater security risk than other computing devices on a network?

(a) IoT devices cannot function on an isolated network with only an Internet connection

(b) Most IoT devices do not require an Internet connection and are unable to receive new updates

(c) IoT devices require unencrypted wireless connections

(d) Most IoT devices do not receive frequent software updates

A

Most IoT devices do not receive frequent software updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How can you keep your personal browsing history hidden from other users on a shared computer?

(a) Move any downloaded files to the recycle bin

(b) Use only an encrypted connection to access websites

(c) Reboot the computer after closing the web browser

(d) Operate the web browser in private browser mode

A

Operate the web browser in private browser mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is an example of two factor authentication?

(a) Your password and your username

(b) Your answer to a general knowledge question and your password

(c) Your fingerprint and your password

(d) Your account number and your name

A

Your fingerprint and your password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You are looking to print photos that you have saved on a cloud storage account using a third-party online printing service. After successfully logging into the cloud account, you are automatically given access to the third-party online printing service. What allowed this automatic authentication to occur?

(a) You are using an unencrypted network which allows the password for the cloud storage service to be viewed by the online printing service

(b) The cloud storage service is an approved application for the online printing service

(c) Your account information for the cloud storage service was intercepted by a malicious application

(d) The password you entered for the online printing service is the same as the password you use for the cloud storage service

A

The cloud storage service is an approved application for the online printing service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is a requirement of a strong password?

(a) Use a dictionary word or a common statement that you’ll remember

(b) Use special characters such as ! @ or $

(c) Use at least six characters

A

Use special characters such as ! @ or $

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You are having difficulty remembering passwords for all of your online accounts. What should you do?

(a) Write the passwords down and keep them out of sight

(b) Share the passwords with a network administrator or computer technician

(c) Create a single strong password to be used across all online accounts

(d) Save the passwords in a centralized password manager program

A

Save the passwords in a centralized password manager program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can you prevent others from eavesdropping on network traffic when operating a PC on a public Wi-Fi hotspot?

(a) Disable Bluetooth

(b) Use WPA2 encryption

(c) Create unique and strong passwords

(d) Connect with a VPN service

A

Connect with a VPN service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which configuration on a wireless router is not considered to be adequate security for a wireless network?

(a) Preventing the broadcast of an SSID

(b) Implementing WPA2 encryption

(c) Modifying the default SSID and password of a wireless router

(d) Enabling wireless security

A

Preventing the broadcast of an SSID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which technology removes direct equipment and maintenance costs from the user for data backups?

(a) A cloud service

(b) An external hard drive

(c) Network attached storage

(d) A tape

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You have stored your data on a local hard disk. Which method would secure this data from unauthorized access?

(a) Duplication of the hard drive

(b) Two factor authentication

(c) Data encryption

(d) Deletion of sensitive files

A

Data encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly