I Hate CBT's

View Original

How Is A Worm Different From A Trojan

Question:

Answer: A worm spreads through a network, whereas a Trojan hides inside another program.

Question:

Answer: Keeping your Social Security number hidden in a locked box in your home

Question: _____ ensures that the person requesting access to a computer is not an imposter.

-Data mining

-Authentication

-Encryption

-Automatic encoding

Answer: Authentication

Question: How can you protect a computer from electrical spikes and surges?

-Use a surge protector.

-Unplug the computer when it is not in use.

-Use an uninterruptible power supply.

-Use a cable lock.

Answer: Use a surge protector.

Question: Which of the following types of websites typically provides the least security?

-online banking sites

-online shopping sites

-social media sites

-private business sites

Answer: social media sites

Question: What would a password manager allow you to do?

-Test your memorization skills.

-Create and store multiple strong passwords.

-Make sure you do not repeat passwords on similar accounts.

-Prevent you from using birthdays in your passwords.

Answer: Create and store multiple strong passwords.

Question: Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?

-Cyberbullying

-Ergonomics

-Technology addiction

-Repetitive strain

Answer: Ergonomics

Question:

Answer: He can use remote tracking to retrace the thief’s steps.

Question: Which of the following is the strongest password?

-Test1test2test3

-colorbluesky

-Welcome123

-H@veAGr3atDaY!

Answer: H@veAGr3atDaY!

Question:

Answer: Do not provide personal information over the phone or through email.