Deck 8: Safety and Security

ملء الشاشة (f)
exit full mode
سؤال
To connect to the Internet in a home network, use a router.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Designing, manufacturing, using, and disposing of electronic products in ways friendly to both people and the environment is Energy Star computing.
سؤال
A password is not a personal identification number.
سؤال
An identity thief obtains personal information from various online and real-world sources.
سؤال
Service packs ensure that your data is scrambled as it travels between you and its Internet destination.
سؤال
Hacktivists is the study of safe and efficient working environments.
سؤال
The crime of hacking into and attacking networks is cybercrime.
سؤال
Netiquette  involves  humiliation, rumors, lies, taunts, or threats.
سؤال
Using personal features to identify a person is biometrics.
سؤال
Just about every site you visit stores a cookie in your computer's browser.
سؤال
When a hard drive fails, Mac users see what is commonly called the Blue Screen of Death.
سؤال
A personal health risk that you may face as you use computers is RSIs.
سؤال
Using your  identity ,  thieves  usually commit financial fraud.
سؤال
Cyberbullying involves the same dynamics as other forms of violence.
سؤال
Magnetic hard drives have no moving parts and are relatively stable.
سؤال
Internet addiction is the excessive use of the Internet for gaming, video, web surfing, and so on.
سؤال
A hoax involves throwing out "bait" in the form of an email or social media post in the hopes that a few users will respond.
سؤال
The process of authentication is used to verify a user.
سؤال
No legitimate company will ask you for email sign-in or personal information.
سؤال
Pharming is an illicit activity in which you are  directed  to a fake site to enter personal information.
سؤال
Cloud storage systems have ____ at various online locations that provide additional protection.

A) hackers
B) backups
C) encryption
D) malware
سؤال
The effects of a(n) ____ can include physical damage and a general disruption of regular activities.

A) spam event
B) phishing episode
C) war driving incident
D) cyberattack
سؤال
A secure website has ____ at the beginning of the URL.

A) http://
B) https:/
C) ftp://
D) hssp://
سؤال
Make sure your ____ provider uses strong encryption-based security and has a secure physical environment.

A) antivirus
B) hotspot
C) cloud
D) spam
سؤال
RSIs or ____ are caused by performing the same movement over and over again.

A) repetitive strain immersion
B) repetitive strain injuries
C) repetitive syndrome injuries
D) repetitive stress injuries
سؤال
The device that sends the signal to connect your wireless devices to the Internet is ____.

A) wireless router
B) wireless firewall
C) wireless software
D) n one of the above
سؤال
Junk email, is also known as ____.

A) malware
B) spam
C) spyware
D) worm
سؤال
When a hard drive fails, Mac users see the ____.

A) Spinning Hand of Death
B) Grey Fail Screen
C) Marble of Doom
D) Blue Screen of Death
سؤال
Software protection includes all but which of the following?

A) Firewall
B) Antivirus
C) Antispyware
D) Adware
سؤال
The numeric score that affects your future ability to obtain credit is your ____.

A) credit score
B) netiquette
C) identity
D) pin number
سؤال
A(n) ____ is an alphanumeric series of characters that you create to identify yourself online.

A) ID
B) password
C) username
D) none of the above
سؤال
____ can lurk undetected in your system, infect it, and spread when you distribute infected files.

A) Spyware
B) Trojan horse
C) Viruses
D) Worms
سؤال
____ hard drives are especially prone to failure.

A) Wireless
B) Cloud
C) Solid state
D) Magnetic
سؤال
School districts often develop policies and guidelines that address ____.

A) social media sharing
B) cyberbullying
C) cyberstalking
D) cookies
سؤال
When someone taps into your unprotected Wi-Fi network, it is called ____.

A) Wi-Fi war driving
B) Wi-Fi piggybacking
C) Wi-Fi hotspot
D) Wi-Fi firewall
سؤال
Malware includes all but which of the following?

A) Trojan horses
B) Worms
C) Viruses
D) Spam
سؤال
Areas in a wireless network where you can access the Internet are ____.

A) hotspots
B) Trojan horses
C) piggybacks
D) war drives
سؤال
Which browsing mode will not save your browsing history, temporary Internet files, form data, cookies, usernames, or passwords?

A) Stealth
B) Hid den
C) InPrivate
D) All of the above
سؤال
People who break into computers and networks are ____?

A) hackers
B) developers
C) worms
D) rootkits
سؤال
___ spread by automatically sending themselves to everyone in your address book.

A) Worms
B) Viruses
C) Rootkits
D) Spyware
سؤال
A drawback of cloud storage includes ____

A) increased opportunities for data theft or manipulation
B) dependence on technology that the customer does not control
C) interrupted access to data during power or internet disruptions
D) all of the above
سؤال
____ secretly collects user data, such as web surfing habits.

A) Spyware
B) Ransomware
C) All of the above
D) None of the above
سؤال
Suppose an email sender uses a fake address that is masked by a familiar address. This deceptive practice is known as ____.

A) address spoofing
B) pharming
C) war driving
D) wireless sniffing
سؤال
On a secure website, a ____ icon may appear in the address bar.

A) bird
B) padlock
C) star
D) none of the above
سؤال
____, or environmentally friendly, computing and recycling can reduce the environmental impact of electronic waste and ultimately reduce costs.

A) Blue
B) Green
C) Yellow
D) None of the above
سؤال
____ disguise themselves as useful programs or apps but do damage when you run them;

A) Trojan horses
B) Rootkits
C) All of the above
D) None of the above
سؤال
Which of the following privacy measures adds security by requiring two distinct items for verification?

A) Two-factor authentication
B) Two-step authentication
C) Two-factor verification
D) All of the above
سؤال
Biometric systems include all but which of the following?

A) fingerprint scanners
B) hair scanners
C) facial recognition technology
D) eye scans
سؤال
A ____ is a unit of data collected as a package so it can be transmitted in a network path.

A) data packet
B) hotspot
C) BSoD
D) RSI
سؤال
Possible causes of data loss include all of the following, except ____:

A) regular backups
B) a hard drive crash,
C) a natural disaster
D) theft
سؤال
____ can intercept and analyze data transmitted over any network, and it is a risk that can breach what otherwise might have been considered secured data.

A) Wireless sniffing
B) War driving
C) Piggybacking
D) Encryption
سؤال
____ on the Internet make up "the cloud."

A) Servers
B) Packets
C) Firewalls
D) Routers
سؤال
Using a ____ can reduce risk of metabolic problems and circulatory issues by reducing time spent sitting.

A) standing desk
B) ergonomic chair
C) firewall
D) router
سؤال
A good example of a strong password is ____.

A) password1
B) 12345
C) EmilyMay1998
D) DumFDP076
سؤال
____ can infect your computer or compromise your identity.

A) Opening an email attachment
B) Going to an unsecured website
C) All of the above
D) None of the above
سؤال
Which of the following does NOT pose a significant threat to your physical, employment, and financial security?

A) cyberterrorists
B) hackers
C) blogger
D) spammers
سؤال
Eyestrain, headaches, dry eyes, blurry vision, and double vision are symptoms of ____ syndrome.

A) computer vision
B) eye scan
C) biometric
D) ergonomic
سؤال
Discarded computers, cell phones, and other electronics are considered ____.

A) electronic trash
B) e-waste
C) e-trash
D) all of the above
سؤال
A PIN or ____ is used to get into accounts through an ATM.

A) personal information number
B) personal identification name
C) personal information name
D) personal identification number
سؤال
____ is the premeditated disruption of computers and networks.

A) Cyberterrorism
B) Hacking
C) Spamming
D) War driving
سؤال
Match between columns
A hacker whose work is nondestructive.
war driving
A hacker whose work is nondestructive.
hacktivist
A hacker whose work is nondestructive.
white hat hacker
A hacker whose work is nondestructive.
hacker
A hacker whose work is nondestructive.
black hat hacker
A hacker whose work is extremely destructive.
war driving
A hacker whose work is extremely destructive.
hacktivist
A hacker whose work is extremely destructive.
white hat hacker
A hacker whose work is extremely destructive.
hacker
A hacker whose work is extremely destructive.
black hat hacker
People who break into computers and computer networks, often by exploiting weaknesses and preventable flaws.
war driving
People who break into computers and computer networks, often by exploiting weaknesses and preventable flaws.
hacktivist
People who break into computers and computer networks, often by exploiting weaknesses and preventable flaws.
white hat hacker
People who break into computers and computer networks, often by exploiting weaknesses and preventable flaws.
hacker
People who break into computers and computer networks, often by exploiting weaknesses and preventable flaws.
black hat hacker
A practice in which someone searches for and maps unsecured Wi-Fi networks from a vehicle.
war driving
A practice in which someone searches for and maps unsecured Wi-Fi networks from a vehicle.
hacktivist
A practice in which someone searches for and maps unsecured Wi-Fi networks from a vehicle.
white hat hacker
A practice in which someone searches for and maps unsecured Wi-Fi networks from a vehicle.
hacker
A practice in which someone searches for and maps unsecured Wi-Fi networks from a vehicle.
black hat hacker
A hacker who hacks for the purpose of a social goal or impact.
war driving
A hacker who hacks for the purpose of a social goal or impact.
hacktivist
A hacker who hacks for the purpose of a social goal or impact.
white hat hacker
A hacker who hacks for the purpose of a social goal or impact.
hacker
A hacker who hacks for the purpose of a social goal or impact.
black hat hacker
سؤال
____ are used as identification cards to authenticate the website owner.

A) Digital certificates
B) Packets
C) BSoDs
D) Hotspots
سؤال
____ is malicious software that blocks access to a computer system until a sum of money is paid.

A) Ransomware
B) Spyware
C) Hoaxware
D) Pharmware
سؤال
Protect your mobile device from unauthorized use by ____.

A) locking the device when not in use
B) refraining from installing apps from unknown sources
C) all of the above
D) none of the above
سؤال
Identity thieves may target your ____.

A) Social Security number
B) credit card and debit card numbers
C) PINs and passwords
D) all of the above
سؤال
You can greatly reduce the chances of losing your financial data to fraudulent activities by ____.

A) making sure your shopping websites use https:// or lock icons
B) downloading electronic wallet software and security apps to use when you purchase items
C) using strong passwords that are unique for each account that you create
D) all of the above
سؤال
Privacy can be protected by ____.

A) deleting old online accounts
B) increasing the privacy settings on your social network accounts
C) blocking third-party cookies from untrustworthy sites
D) all of the above
سؤال
____ software identifies malware that tries to install on your computer or device.

A) Antivirus
B) Firewall
C) Electronic wallet
D) Digital certificate
سؤال
Strong passwords do not ____.

A) include your name
B) have more than five characters
C) include a mixture of letters, numbers, and symbols
D) use both uppercase and lowercase letters
سؤال
A ____ protects your system from intruders.

A) firewall
B) digital wallet
C) digital certificate
D) none of the above
سؤال
Practice green computing by ____

A) using products that have the Energy Star logo
B) discarding old electronics using municipal curbside waste pickup
C) frequently purchasing the latest electronic gadget
D) all of the above
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/71
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 8: Safety and Security
1
To connect to the Internet in a home network, use a router.
True
2
Designing, manufacturing, using, and disposing of electronic products in ways friendly to both people and the environment is Energy Star computing.
False
3
A password is not a personal identification number.
True
4
An identity thief obtains personal information from various online and real-world sources.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
5
Service packs ensure that your data is scrambled as it travels between you and its Internet destination.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
6
Hacktivists is the study of safe and efficient working environments.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
7
The crime of hacking into and attacking networks is cybercrime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
8
Netiquette  involves  humiliation, rumors, lies, taunts, or threats.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
9
Using personal features to identify a person is biometrics.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
10
Just about every site you visit stores a cookie in your computer's browser.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
11
When a hard drive fails, Mac users see what is commonly called the Blue Screen of Death.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
12
A personal health risk that you may face as you use computers is RSIs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
13
Using your  identity ,  thieves  usually commit financial fraud.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
14
Cyberbullying involves the same dynamics as other forms of violence.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
15
Magnetic hard drives have no moving parts and are relatively stable.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
16
Internet addiction is the excessive use of the Internet for gaming, video, web surfing, and so on.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
17
A hoax involves throwing out "bait" in the form of an email or social media post in the hopes that a few users will respond.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
18
The process of authentication is used to verify a user.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
19
No legitimate company will ask you for email sign-in or personal information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
20
Pharming is an illicit activity in which you are  directed  to a fake site to enter personal information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
21
Cloud storage systems have ____ at various online locations that provide additional protection.

A) hackers
B) backups
C) encryption
D) malware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
22
The effects of a(n) ____ can include physical damage and a general disruption of regular activities.

A) spam event
B) phishing episode
C) war driving incident
D) cyberattack
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
23
A secure website has ____ at the beginning of the URL.

A) http://
B) https:/
C) ftp://
D) hssp://
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
24
Make sure your ____ provider uses strong encryption-based security and has a secure physical environment.

A) antivirus
B) hotspot
C) cloud
D) spam
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
25
RSIs or ____ are caused by performing the same movement over and over again.

A) repetitive strain immersion
B) repetitive strain injuries
C) repetitive syndrome injuries
D) repetitive stress injuries
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
26
The device that sends the signal to connect your wireless devices to the Internet is ____.

A) wireless router
B) wireless firewall
C) wireless software
D) n one of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
27
Junk email, is also known as ____.

A) malware
B) spam
C) spyware
D) worm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
28
When a hard drive fails, Mac users see the ____.

A) Spinning Hand of Death
B) Grey Fail Screen
C) Marble of Doom
D) Blue Screen of Death
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
29
Software protection includes all but which of the following?

A) Firewall
B) Antivirus
C) Antispyware
D) Adware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
30
The numeric score that affects your future ability to obtain credit is your ____.

A) credit score
B) netiquette
C) identity
D) pin number
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
31
A(n) ____ is an alphanumeric series of characters that you create to identify yourself online.

A) ID
B) password
C) username
D) none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
32
____ can lurk undetected in your system, infect it, and spread when you distribute infected files.

A) Spyware
B) Trojan horse
C) Viruses
D) Worms
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
33
____ hard drives are especially prone to failure.

A) Wireless
B) Cloud
C) Solid state
D) Magnetic
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
34
School districts often develop policies and guidelines that address ____.

A) social media sharing
B) cyberbullying
C) cyberstalking
D) cookies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
35
When someone taps into your unprotected Wi-Fi network, it is called ____.

A) Wi-Fi war driving
B) Wi-Fi piggybacking
C) Wi-Fi hotspot
D) Wi-Fi firewall
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
36
Malware includes all but which of the following?

A) Trojan horses
B) Worms
C) Viruses
D) Spam
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
37
Areas in a wireless network where you can access the Internet are ____.

A) hotspots
B) Trojan horses
C) piggybacks
D) war drives
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
38
Which browsing mode will not save your browsing history, temporary Internet files, form data, cookies, usernames, or passwords?

A) Stealth
B) Hid den
C) InPrivate
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
39
People who break into computers and networks are ____?

A) hackers
B) developers
C) worms
D) rootkits
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
40
___ spread by automatically sending themselves to everyone in your address book.

A) Worms
B) Viruses
C) Rootkits
D) Spyware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
41
A drawback of cloud storage includes ____

A) increased opportunities for data theft or manipulation
B) dependence on technology that the customer does not control
C) interrupted access to data during power or internet disruptions
D) all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
42
____ secretly collects user data, such as web surfing habits.

A) Spyware
B) Ransomware
C) All of the above
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
43
Suppose an email sender uses a fake address that is masked by a familiar address. This deceptive practice is known as ____.

A) address spoofing
B) pharming
C) war driving
D) wireless sniffing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
44
On a secure website, a ____ icon may appear in the address bar.

A) bird
B) padlock
C) star
D) none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
45
____, or environmentally friendly, computing and recycling can reduce the environmental impact of electronic waste and ultimately reduce costs.

A) Blue
B) Green
C) Yellow
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
46
____ disguise themselves as useful programs or apps but do damage when you run them;

A) Trojan horses
B) Rootkits
C) All of the above
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
47
Which of the following privacy measures adds security by requiring two distinct items for verification?

A) Two-factor authentication
B) Two-step authentication
C) Two-factor verification
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
48
Biometric systems include all but which of the following?

A) fingerprint scanners
B) hair scanners
C) facial recognition technology
D) eye scans
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
49
A ____ is a unit of data collected as a package so it can be transmitted in a network path.

A) data packet
B) hotspot
C) BSoD
D) RSI
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
50
Possible causes of data loss include all of the following, except ____:

A) regular backups
B) a hard drive crash,
C) a natural disaster
D) theft
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
51
____ can intercept and analyze data transmitted over any network, and it is a risk that can breach what otherwise might have been considered secured data.

A) Wireless sniffing
B) War driving
C) Piggybacking
D) Encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
52
____ on the Internet make up "the cloud."

A) Servers
B) Packets
C) Firewalls
D) Routers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
53
Using a ____ can reduce risk of metabolic problems and circulatory issues by reducing time spent sitting.

A) standing desk
B) ergonomic chair
C) firewall
D) router
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
54
A good example of a strong password is ____.

A) password1
B) 12345
C) EmilyMay1998
D) DumFDP076
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
55
____ can infect your computer or compromise your identity.

A) Opening an email attachment
B) Going to an unsecured website
C) All of the above
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
56
Which of the following does NOT pose a significant threat to your physical, employment, and financial security?

A) cyberterrorists
B) hackers
C) blogger
D) spammers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
57
Eyestrain, headaches, dry eyes, blurry vision, and double vision are symptoms of ____ syndrome.

A) computer vision
B) eye scan
C) biometric
D) ergonomic
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
58
Discarded computers, cell phones, and other electronics are considered ____.

A) electronic trash
B) e-waste
C) e-trash
D) all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
59
A PIN or ____ is used to get into accounts through an ATM.

A) personal information number
B) personal identification name
C) personal information name
D) personal identification number
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
60
____ is the premeditated disruption of computers and networks.

A) Cyberterrorism
B) Hacking
C) Spamming
D) War driving
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
61
Match between columns
A hacker whose work is nondestructive.
war driving
A hacker whose work is nondestructive.
hacktivist
A hacker whose work is nondestructive.
white hat hacker
A hacker whose work is nondestructive.
hacker
A hacker whose work is nondestructive.
black hat hacker
A hacker whose work is extremely destructive.
war driving
A hacker whose work is extremely destructive.
hacktivist
A hacker whose work is extremely destructive.
white hat hacker
A hacker whose work is extremely destructive.
hacker
A hacker whose work is extremely destructive.
black hat hacker
People who break into computers and computer networks, often by exploiting weaknesses and preventable flaws.
war driving
People who break into computers and computer networks, often by exploiting weaknesses and preventable flaws.
hacktivist
People who break into computers and computer networks, often by exploiting weaknesses and preventable flaws.
white hat hacker
People who break into computers and computer networks, often by exploiting weaknesses and preventable flaws.
hacker
People who break into computers and computer networks, often by exploiting weaknesses and preventable flaws.
black hat hacker
A practice in which someone searches for and maps unsecured Wi-Fi networks from a vehicle.
war driving
A practice in which someone searches for and maps unsecured Wi-Fi networks from a vehicle.
hacktivist
A practice in which someone searches for and maps unsecured Wi-Fi networks from a vehicle.
white hat hacker
A practice in which someone searches for and maps unsecured Wi-Fi networks from a vehicle.
hacker
A practice in which someone searches for and maps unsecured Wi-Fi networks from a vehicle.
black hat hacker
A hacker who hacks for the purpose of a social goal or impact.
war driving
A hacker who hacks for the purpose of a social goal or impact.
hacktivist
A hacker who hacks for the purpose of a social goal or impact.
white hat hacker
A hacker who hacks for the purpose of a social goal or impact.
hacker
A hacker who hacks for the purpose of a social goal or impact.
black hat hacker
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
62
____ are used as identification cards to authenticate the website owner.

A) Digital certificates
B) Packets
C) BSoDs
D) Hotspots
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
63
____ is malicious software that blocks access to a computer system until a sum of money is paid.

A) Ransomware
B) Spyware
C) Hoaxware
D) Pharmware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
64
Protect your mobile device from unauthorized use by ____.

A) locking the device when not in use
B) refraining from installing apps from unknown sources
C) all of the above
D) none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
65
Identity thieves may target your ____.

A) Social Security number
B) credit card and debit card numbers
C) PINs and passwords
D) all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
66
You can greatly reduce the chances of losing your financial data to fraudulent activities by ____.

A) making sure your shopping websites use https:// or lock icons
B) downloading electronic wallet software and security apps to use when you purchase items
C) using strong passwords that are unique for each account that you create
D) all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
67
Privacy can be protected by ____.

A) deleting old online accounts
B) increasing the privacy settings on your social network accounts
C) blocking third-party cookies from untrustworthy sites
D) all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
68
____ software identifies malware that tries to install on your computer or device.

A) Antivirus
B) Firewall
C) Electronic wallet
D) Digital certificate
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
69
Strong passwords do not ____.

A) include your name
B) have more than five characters
C) include a mixture of letters, numbers, and symbols
D) use both uppercase and lowercase letters
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
70
A ____ protects your system from intruders.

A) firewall
B) digital wallet
C) digital certificate
D) none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
71
Practice green computing by ____

A) using products that have the Energy Star logo
B) discarding old electronics using municipal curbside waste pickup
C) frequently purchasing the latest electronic gadget
D) all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.