COMPUTER CONCEPTS MODULE 6 EXAM QUESTIONS AND ANSWERS WITH COMPLETE SOLUTION

preview_player
Показать описание
.COMPUTER CONCEPTS MODULE 6 EXAM QUESTIONS
AND ANSWERS WITH COMPLETE SOLUTION
_____ ensures that the person requesting access to a computer is not an imposter. -
Authentication
After Penny broke up with her boyfriend, he texted some teammates from the track team
about some private and intimate moments he and Penny had shared while they were
dating. He even lied about their breakup, creating rumors about her behavior. Penny
started getting inappropriate looks and advances from the team whenever she was at
practice and felt completely humiliated. Penny is a victim of ________. - cyberbullying
Cassidy is a medical assistant in a hospital and has access to many medical files. When she
brings patients to the examining room, she can be observed swiping a card, typing in a
password, and staring into what appears to be a camera, all attached to the computer. After
completing her check-in, Cassidy leaves the patient in the examining room waiting on the
doctor. It is important that she logs out of the system so the patient does not have access to
the information stored in the hospital's database. Based on Cassidy's actions what systems
do you think the hospital has in place to protect the patient medical records? - biometric
security (?)
Creating a(n) _____ means copying files from a computer's hard drive and storing them in a
remote location. - data backup
Emma downloaded a new game from an unfamiliar website. A few days later, Emma
realized her system had been hacked and her credit card numbers were stolen. Without
Emma knowing, what type of malware might she have downloaded to her computer? - A
Trojan
How can an attacker execute malware through a script? - An attacker can attach a script to
a program that you download which then infects your computer
How can you protect a computer from electrical spikes and surges? - Use a surge protector.
How can you protect personal information gathered by legitimate organizations? - Create a
separate email account for receiving information from websites.
How does discarding computers in a landfill affect the environment? - Lead and mercury in
computer parts are seeping into the ground and water supply.
How does encryption work? - It scrambles the information until the key is used to
unscramble it.
.
.
.
.
.
.
.
.
Рекомендации по теме