CSC 101 Module 6 Practice Questions and
Answers Updated 2024
_____ ensures that the person requesting access to a computer is not an imposter.
A) Data mining
B) Authentication
C) Encryption
D) Automatic encoding - Answer✔✔-B:Authentication
After Penny broke up with her boyfriend, he texted some teammates from the track team about
some private and intimate moments he and Penny had shared while they were dating. He even
lied about their breakup, creating rumors about her behavior. Penny started getting
inappropriate looks and advances from the team whenever she was at practice and felt
completely humiliated. Penny is a victim of ________.
A) cyberstalking
B) cyberbullying
C) social engineering
Page 1/16
,EMILLECT 2024/2025 ACADEMIC YEAR ©2024 EMILLECT. ALL RIGHTS RESERVED FIRST PUBLISH OCTOBER, 2024
D) data mining - Answer✔✔-B:cyberbullying
Cassidy is a medical assistant in a hospital and has access to many medical files. When she
brings patients to the examining room, she can be observed swiping a card, typing in a
password, and staring into what appears to be a camera, all attached to the computer. After
completing her check-in, Cassidy leaves the patient in the examining room waiting on the
doctor. It is important that she logs out of the system so the patient does not have access to the
information stored in the hospital's database. Based on Cassidy's actions what systems do you
think the hospital has in place to protect the patient medical records?
A) Digital certificates
B) Two factor authentication
C) Biometrics
D) Encryption - Answer✔✔-C:Biometrics
Creating a(n) _____ means copying files from a computer's hard drive and storing them in a
remote location.
A) uninterruptible data supply
B) private copy
C) alarm
Page 2/16
, EMILLECT 2024/2025 ACADEMIC YEAR ©2024 EMILLECT. ALL RIGHTS RESERVED FIRST PUBLISH OCTOBER, 2024
D) data backup - Answer✔✔-D:data backup
Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized
her system had been hacked and her credit card numbers were stolen. Without Emma knowing,
what type of malware might she have downloaded to her computer?
A) worm
B) Trojan
C) spam
D) ransomware - Answer✔✔-B:A Trojan
How can an attacker execute malware through a script?
A) An attacker can steal a cookie and impersonate you in a script,thereby infecting someone
else's computer.
B) An attacker can attach to a plug-in and when you allow the plug-in to run,it infects the
website you were visiting.
C) An attacker can impersonate a pop-up and when you click on it create a script to spread a
Trojan.
Page 3/16