I Hate CBT's

View Original

How Can You Protect Personal Information Gathered By Legitimate Organizations

Question: _____ ensures that the person requesting access to a computer is not an imposter.

Answer: Authentication

Question:

Answer: cyberbullying

Question: biometric security (?)

Answer:

Question: Creating a(n) _____ means copying files from a computer’s hard drive and storing them in a remote location.

Answer: data backup

Question: Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?

Answer: A Trojan

Question: How can an attacker execute malware through a script?

Answer: An attacker can attach a script to a program that you download which then infects your computer

Question: How can you protect a computer from electrical spikes and surges?

Answer: Use a surge protector.

Question: How can you protect personal information gathered by legitimate organizations?

Answer: Create a separate email account for receiving information from websites.

Question: How does discarding computers in a landfill affect the environment?

Answer: Lead and mercury in computer parts are seeping into the ground and water supply.

Question: How does encryption work?

Answer: It scrambles the information until the key is used to unscramble it.