How Is A Worm Different From A Trojan
Question:
Answer: A worm spreads through a network, whereas a Trojan hides inside another program.
Question:
Answer: Keeping your Social Security number hidden in a locked box in your home
Question: _____ ensures that the person requesting access to a computer is not an imposter.
-Data mining
-Authentication
-Encryption
-Automatic encoding
Answer: Authentication
Question: How can you protect a computer from electrical spikes and surges?
-Use a surge protector.
-Unplug the computer when it is not in use.
-Use an uninterruptible power supply.
-Use a cable lock.
Answer: Use a surge protector.
Question: Which of the following types of websites typically provides the least security?
-online banking sites
-online shopping sites
-social media sites
-private business sites
Answer: social media sites
Question: What would a password manager allow you to do?
-Test your memorization skills.
-Create and store multiple strong passwords.
-Make sure you do not repeat passwords on similar accounts.
-Prevent you from using birthdays in your passwords.
Answer: Create and store multiple strong passwords.
Question: Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?
-Cyberbullying
-Ergonomics
-Technology addiction
-Repetitive strain
Answer: Ergonomics
Question:
Answer: He can use remote tracking to retrace the thief’s steps.
Question: Which of the following is the strongest password?
-Test1test2test3
-colorbluesky
-Welcome123
-H@veAGr3atDaY!
Answer: H@veAGr3atDaY!
Question:
Answer: Do not provide personal information over the phone or through email.