True/False Indicate whether the
statement is true or false.
|
|
1.
|
Using a notebook computer introduces risks not associated with desktop
computers.
|
|
2.
|
Eavesdropping software can be downloaded free from the Internet and used by a
hacker to access an unsecured wireless connection.
|
|
3.
|
A software firewall is more secure and easier to monitor than a hardware
firewall.
|
|
4.
|
Data that has been saved cannot be lost or corrupted by equipment failure,
software viruses or hackers, fire or flood, or power irregularities.
|
|
5.
|
Some spyware disguises itself as antispyware to gain access to your
system.
|
|
6.
|
Firewalls help prevent employees from tampering with or deleting data.
|
|
7.
|
If you work for a company that provides e-mail services, the information that
you send is your property.
|
|
8.
|
Before providing personal information or credit card information on an
e-commerce site, first verify that the site is secure.
|
|
9.
|
It is the responsibility of a company or individual to protect their
data.
|
|
10.
|
Old computer hardware such as monitors can create an environmental hazard if
disposed of improperly.
|
Multiple Choice Identify the
choice that best completes the statement or answers the question.
|
|
11.
|
What action might obstruct the air vents in your notebook computer and cause it
to overheat?
a. | Leaving it in the same position on the desk for too long | b. | Using a cooling
pad | c. | Setting it directly on your lap | d. | Plugging it into a grounded
outlet |
|
|
12.
|
What can result from making too many of the same motions over a long period of
time?
a. | Browser hijacking | c. | Repetitive strain injury | b. | Brute force
attacks | d. | Relaxed eye
muscles |
|
|
13.
|
It is estimated that ____ causes millions of dollars of damage each year, along
with the theft of important and valuable data.
a. | hacking | c. | spying | b. | encryption | d. | eavesdropping |
|
|
14.
|
One easy way to avoid data loss is to ____.
a. | plug the computer into a grounded outlet | c. | install a
firewall | b. | save frequently | d. | turn on some form of encryption |
|
|
15.
|
Surge protectors help protect computers from ____.
a. | hackers | c. | power spikes | b. | sniffers | d. | hard disk
crashes |
|
|
16.
|
External hard drives can be used to help ____.
a. | prevent computer hacking | c. | safeguard against software
threats | b. | avoid data loss | d. | protect your system against spyware |
|
|
17.
|
Often, you can inadvertently run a virus program by ____.
a. | installing a security update | c. | opening an e-mail message or
attachment | b. | backing up data | d. | using a surge protector |
|
|
18.
|
What is another term for brute force attacks?
a. | Browser hijacking | c. | Keylogger attacks | b. | Spyware attacks | d. | Dictionary
attacks |
|
|
19.
|
The goal of ____ is to collect information about the user, the user’s
browsing habits, and other personal information.
a. | a sniffer | c. | a virus | b. | worms | d. | spyware |
|
|
20.
|
Any information stored on a computer in an educational facility is the property
of the ____.
a. | person using the computer | c. | person who created the
information | b. | school | d. | none
of the above |
|
|
21.
|
TSL and SSL technology enables ____.
a. | data to be backed up securely | b. | companies to monitor unauthorized computer
activity | c. | system administrators to restrict access to files | d. | sensitive
information to be encrypted |
|
|
22.
|
To make sure your e-commerce transactions are secure and to protect your private
information, you should ____.
a. | use a secure browser | c. | keep personal information private | b. | check privacy
policies | d. | all of the
above |
|
|
23.
|
When is it possible for the information that you submit on the Internet to be
gathered by many persons and used for various situations?
a. | When you use a secure site | c. | When the data is
encrypted | b. | Only if you don’t have a firewall | d. | Any time |
|
|
24.
|
Which of the following is not true about spyware?
a. | It tracks your Web habits | b. | It can take over control of your
computer | c. | It has redeeming qualities | d. | It can direct you to Web sites you have not
chosen to visit |
|
|
25.
|
When you use a computer in a public place, you should ____.
a. | verify that you have logged off | c. | use cookies to track your computer
use | b. | install antivirus software | d. | use a code name |
|
|
26.
|
If non-copyrighted information is published on a Web site, ____.
a. | it is true | c. | it is false | b. | it cannot be copied and used as your
own | d. | the author is relieved
of any responsibility |
|
|
27.
|
What should you do before donating a computer?
a. | Remove the antivirus software | c. | Delete data from the hard
drive | b. | Password-protect the operating system | d. | Turn off any encryption
technologies |
|
|
28.
|
Which of the following would be considered the strongest password?
a. | JeR3My | c. | SouTHWeST! | b. | tHund3r$t0rM | d. | #1fusion |
|
|
|
FIGURE 30-1
|
|
29.
|
The message in Figure 30-1 above shows an example of ____.
a. | hacking | c. | sniffing | b. | phishing | d. | browser
hijacking |
|
|
|
FIGURE 30-2
|
|
30.
|
You could use the program shown in Figure 30-2 above to ____.
a. | protect your system against spyware | c. | configure a hardware
firewall | b. | back up files | d. | password protect your wireless network |
|
|
|
Case 30-1 Nelson is a graphic designer who works long hours on his
computer. He tries to take precautions to avoid chronic physical maladies such as eyestrain, back
problems, and repetitive strain injuries.
|
|
31.
|
What kind of furniture should Nelson use to help adapt his equipment and his
workplace to fit himself?
a. | Expensive | c. | Ergonomic | b. | Light-weight | d. | Soft |
|
|
32.
|
What can Nelson do to help avoid or minimize eyestrain?
a. | Use a low-resolution monitor to increase visibility | b. | Stay in the same
position so his eyes become more comfortable | c. | Avoid using extra lighting so the monitor is
more easily visible | d. | Take regular breaks to allow the eye muscles to
relax |
|
|
|
Case 30-2 Molly has just purchased a router and is setting up a
wireless network in her home office. She wants to secure it properly.
|
|
33.
|
What is the first step Molly should take when setting up her wireless
network?
a. | Download eavesdropping software | c. | Turn off the default
encryption | b. | Change the default password | d. | Configure a hardware firewall |
|
|
34.
|
If Molly does not properly secure her wireless network connection, what could
happen if her neighbor uses her broadband connection?
a. | Her Internet access could be slower | b. | She could be charged additional
costs | c. | She could be held responsible for any illegal activity | d. | Any of the
above |
|
Matching
|
|
|
Identify the letter of the choice that best
matches the phrase or definition.
a. | Backup and Restore Center
window | b. | Occupational Safety and Health Administration site | c. | FBI
site | d. | VeriSign site | e. | Federal Trade Commission
site |
|
|
35.
|
Where could you find resources for Internet safety?
|
|
36.
|
Where could you back up data?
|
|
37.
|
Where could you purchase an SSL certificate?
|
|
38.
|
Where would you find guidelines for using and purchasing computer
equipment?
|
|
39.
|
Where could you find guidelines to make sure your e-commerce transactions are
secure?
|