100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
(Combined) Module 6 Computer Concepts Exam, Computer Concepts Module 8, Computer Concept Module 9, Module 10 Computer Concepts Exam. With Complete Solution 2024. CA$11.04   Add to cart

Exam (elaborations)

(Combined) Module 6 Computer Concepts Exam, Computer Concepts Module 8, Computer Concept Module 9, Module 10 Computer Concepts Exam. With Complete Solution 2024.

 8 views  0 purchase
  • Course
  • Institution

(Combined) Module 6 Computer Concepts Exam, Computer Concepts Module 8, Computer Concept Module 9, Module 10 Computer Concepts Exam. With Complete Solution 2024. _____ ensures that the person requesting access to a computer is not an imposter. Authentication After Penny broke up with her boyfr...

[Show more]

Preview 2 out of 14  pages

  • June 20, 2024
  • 14
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
avatar-seller
(Combined) Module 6 Computer Concepts
Exam, Computer Concepts Module 8,
Computer Concept Module 9, Module 10
Computer Concepts Exam. With Complete
Solution 2024.
_____ ensures that the person requesting access to a computer is not an
imposter.
Authentication
After Penny broke up with her boyfriend, he texted some teammates from the
track team about some private and intimate moments he and Penny had shared
while they were dating. He even lied about their breakup, creating rumors about
her behavior. Penny started getting inappropriate looks and advances from the
team whenever she was at practice and felt completely humiliated. Penny is a
victim of ________.
cyberbullying
Cassidy is a medical assistant in a hospital and has access to many medical files.
When she brings patients to the examining room, she can be observed swiping a
card, typing in a password, and staring into what appears to be a camera, all
attached to the computer. After completing her check-in, Cassidy leaves the
patient in the examining room waiting on the doctor. It is important that she logs
out of the system so the patient does not have access to the information stored in
the hospital's database. Based on Cassidy's actions what systems do you think
the hospital has in place to protect the patient medical records?
biometric security (?)
Creating a(n) _____ means copying files from a computer's hard drive and storing
them in a remote location.
data backup
Emma downloaded a new game from an unfamiliar website. A few days later,
Emma realized her system had been hacked and her credit card numbers were
stolen. Without Emma knowing, what type of malware might she have
downloaded to her computer?
A Trojan
How can an attacker execute malware through a script?
An attacker can attach a script to a program that you download which then infects your
computer
How can you protect a computer from electrical spikes and surges?
Use a surge protector.
How can you protect personal information gathered by legitimate organizations?
Create a separate email account for receiving information from websites.
How does discarding computers in a landfill affect the environment?

, Lead and mercury in computer parts are seeping into the ground and water supply.
How does encryption work?
It scrambles the information until the key is used to unscramble it.
How is a worm different from a Trojan?
A worm spreads through a network, whereas a Trojan hides inside another program.
How will you decide which browser security settings to allow and which ones to
block?
I will need to review each browser security setting and use my best judgement.
In terms of privacy, which of the following is a best practice?
Keeping your Social Security number hidden in a locked box in your home
In which of the following situations is a digital certificate useful?
you are signing a rental lease.
Isabel received a message on her computer that appeared to be from the FBI. It
informed her that her computer has been locked and she would need to pay a fee
to retrieve her data. How would you describe what is happening?
It is most likely ransomware because it is telling her she has to verify payment
information to unlock her computer.
Marcus recently had his cell phone stolen. All of the following are security
features that should help him locate his stolen phone EXCEPT which one?
He can use remote wiping to retrace the thief's steps.
Siobhan has recently opened a Facebook account and as a new user, is posting
frequently and accepting many friend requests. You see a post about an
upcoming trip and notice that her profile is open to the public. What can you tell
Siobhan to help her use social networking safely?
Be cautious about what information she posts.
Technology can lead to all of the following behavioral risks EXCEPT _____.
higher satisfaction with life
The news reports a security breach of credit card information at a large
department store that has recently laid off many employees. Why should the
store investigate the possibility of the breach being from an insider?
Because insiders sometimes create threats after incidents at their places of employment
There are various risks from attacks on Wi-Fi networks. These include all of the
following EXCEPT _____.
creating malware
What is a digital certificate?
Technology used to verify a user's identity
What is it called when an attacker convinces you to enter personal information at
an imposter website after receiving an email from a person masquerading as an
employee from your bank?
phishing
What type of security requires something you know and something you have that
no one else has?
two factor authentication
What would a password manager allow you to do?
Create and store multiple strong passwords.
Which is a first step to deter thieves from accessing your financial information?

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller MUTUKACOURSEHERO. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for CA$11.04. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

85169 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
CA$11.04
  • (0)
  Add to cart