SOLUTIONS RATED A+
✔✔To protect your information and help you to remember passwords, use your social
media account login information to log into another site.
-True
-False - ✔✔False
✔✔After Penny broke up with her boyfriend, he texted some teammates from the track
team about some private and intimate moments he and Penny had shared while they
were dating. He even lied about their breakup, creating rumors about her behavior.
Penny started getting inappropriate looks and advances from the team whenever she
was at practice and felt completely humiliated. Penny is a victim of ________.
-cyberbullying
-cyberstalking
-data mining
-social engineering - ✔✔Cyberbullying
✔✔Which term refers to the science that specifies the design and arrangement of items
you use so you interact with the items efficiently and safely?
-Ergonomics
-Technology addiction
-Repetitive strain
-Cyberbullying - ✔✔Ergonomics
✔✔Cassidy is a medical assistant in a hospital and has access to many medical files.
When she brings patients to the examining room, she can be observed swiping a card,
typing in a password, and staring into what appears to be a camera, all attached to the
computer. After completing her check-in, Cassidy leaves the patient in the examining
room waiting on the doctor. It is important that she logs out of the system so the patient
does not have access to the information stored in the hospital's database. Based on
Cassidy's actions what systems do you think the hospital has in place to protect the
patient medical records?
-Two factor authentication
-Digital certificates
-Encryption
-Biometrics - ✔✔Biometrics
✔✔With more and more people using technology, what physical health diagnosis is on
the rise?
-cyberbullying
-cyberstalking
-repetitive strain injury
-technology addiction - ✔✔Repetitive strain injury
, ✔✔_____ ensures that the person requesting access to a computer is not an imposter.
-Encryption
-Authentication
-Data mining
-Automatic encoding - ✔✔Authentication
✔✔Emma downloaded a new game from an unfamiliar website. A few days later, Emma
realized her system had been hacked and her credit card numbers were stolen. Without
Emma knowing, what type of malware might she have downloaded to her computer?
-worm
-ransomware
-spam
-Trojan - ✔✔Trojan
✔✔Siobhan has recently opened a Facebook account and as a new user, is posting
frequently and accepting many friend requests. You see a post about an upcoming trip
and notice that her profile is open to the public. What can you tell Siobhan to help her
use social networking safely?
-Allow anyone who "friends" her to view her information.
-Post all types of photos more often.
-Ignore notices from the social networking site about changes to security.
-Be cautious about what information she posts. - ✔✔Be cautious about what information
she posts
✔✔In which of the following situations is a digital certificate useful?
-You are registering for an event.
-You are emailing a friend.
-You are signing a rental lease.
-You are researching a topic for an assignment. - ✔✔You are signing a rental lease
✔✔What is it called when an attacker convinces you to enter personal information at an
imposter website after receiving an email from a person masquerading as an employee
from your bank?
-encryption
-dumpster diving
-identity theft
-phishing - ✔✔Phishing
✔✔Which of the following types of websites typically provides the least security?
-social media sites
-online shopping sites
-private business sites
-online banking sites - ✔✔Social media sites