Module 6 Exam Flashcards
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?
After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________.
What device protects a computer from electrical spikes and surges?
Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?
Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening?
In terms of privacy, which of the following is a best practice?
Keeping your Social Security number hidden in a locked box in your home
The ______ in flat panel fluorescent backlights is difficult to recycle.
Zelda has been a victim of cybersecurity attacks twice, losing considerable sums of money each time. How can she ensure that she does not become a victim to it again? Select all that apply.
She should try and carry her own WiFi, or create a hotspot using her phone, and avoid unprotected public WiFi networks.
She should absolutely not share passwords or account info with anyone.
She should configure all her gadgets to download and install security updates automatically.
By recycling electronics, you can help _____.
keep toxic materials out of the water we drink
preserve limited resources
To use a security cable with a smartphone, you may need to add a(n) _____ing ______
Some web browsers do not support plug-ins. Yes/No
Before donating a computer, you should _____.
securely remove your personal information
remove the power supply
To limit the potential damage from power spikes, use a(n) _______ _________
Prolonged typing without sufficient breaks can NOT cause nerve damage (YES/NO)
The goals of email spoofing include luring the user into _______
logging into a legitimate banking site