Computer Security and Privacy

Published on January 2017 | Categories: Documents | Downloads: 48 | Comments: 0 | Views: 871
of 12
Download PDF   Embed   Report

Comments

Content

Microsoft Digital Literacy Security and Privacy Test Item File The Security and Privacy Test Item File contains 54 test items that cover the 5 course lessons. We recommend that you select 30 items that represent a balance across the lessons to create a student test. For most questions, there is only one correct answer. If an item has multiple answers, the question will state ho w many answers to select. Please note that while all the test items are drawn fr om the online assessments, not all of the online assessment items are included ( for technical reasons) so the numbering convention does not match the online exp erience. Lesson 1: An Overview of Computer Security and Privacy Objective 2.1 Explain what the terms security and privacy mean as they apply to computing. 1. You accidentally delete a registry file. Now you cannot start your computer. What kind of computer threat is this? A. B. C. D. Spoofing Phishing Software piracy Human error

2. Someone has tampered with your computer and erased data. What kind of computer threat is this? A. B. C. D. Physical theft Security Environmental Spyware

3. You want a new stand-alone computer. What will you do to prevent others from accessing your confidential data in this computer? A. B. C. D. Use an uninterruptible power supply (UPS) and a surge protector. Use a user name and password. Back up data and save it in a different location. Install a spyware program and an antivirus program.

4. Your computer does not work when it heats up. What is affecting your computer in this case? A. B. C. D. Hackers trying to access your computer Firewall installed in your computer Many programs opened simultaneously Environment surrounding your computer

5. After a voltage fluctuation, your computer stops working. What will you do to prevent this problem in the future? A. B. C. D. Use a surge protector. Install an antivirus program. Use spyware. Back up data.

6. Your friend is confused with the terms privacy and security. She comes to you with a list of threats to computers. Which of the following threats will you categorize as a threat to computer priva cy? A. B. C. D. Accidental erasure of data Hardware failure Damage to computer because of an earthquake Theft of confidential data

7. There is a hurricane alert in your area. Which one of the following actions will you take to protect the data in your com puter? A. B. C. D. Install a virus protection program. Store the data in a safe location. Install anti-spywarespyware-fighting software. Install a firewall to prevent hacking.

8. Frequent power outages happen in your area. How can you protect your computer from this when a power outage happens? A. B. C. D. Use an uninterruptible power supply (UPS). Use a firewall. Use a surge protector. Install an antivirus program.

9. You spilled coffee on your computer. What kind of threat is this? A. B. C. D. Human error Natural disaster Environmental threat Hacking

10. You receive an e-mail message. The sender of the message claims to be a bank executive and wants your personal information to open an account for you. Which one of the following terms describes this activity? A. B. C. D. Spoofing Spying Hacking Phishing

11. You are unable to log on to your e-mail account. You realize that someone ha s changed the password without your knowledge. Which one of the following terms describes this activity? A. B. C. D. Phishing Spoofing Spamming Cracking

12. The system administrator informs you that a Trojan horse has infected your computer. Which program did the system administrator use to determine this? A. B. C. D. Microsoft® Windows® Firewall Microsoft® Internet Explorer® Antivirus Uninterruptible power supply (UPS)

13. You cannot access a file in a computer that belongs to your friend. What prevents you from accessing the file? A. B. C. D. Spyware Firewall Antivirus Uninterruptible power supply (UPS)

14. The network administrator informs you that Niraj is viewing inappropriate W eb sites. A program installed on Niraj's computer monitors his browsing activiti es without his knowledge. What type of program is installed on Niraj's computer? A. B. C. D. Antivirus Microsoft® Windows® Update Spyware Firewall

Lesson 2: Protecting Your Computer and Your Data

Objective 2.1 Identify the various methods of protecting the operating system, s oftware, and data in your system. 15. Northwind Traders wants to grant network access only to specific employees. Which of the following methods can help Northwind Traders restrict the use of th e network? A. Lock combination B.. Data encryption C. Data backup. D. User identification 16. You need to go to an urgent meeting. You do not want your colleagues to use your computer in your absence. Which of the following methods will you use to ensure that no one uses your comp uter while you are away? A. B. C. D. Turn off the monitor. Use Lock Computer button. Use a firewall. Install updates for your computer.

17. Tulin sets a password for her computer. However, she suspects that someone is accessing her computer in her absence. Which of the following methods will help Tulin ensure that nobody accesses her c omputer without her permission? A. B. C. D. Use an anti-spywarespyware-fighting program. Update the operating system. Deploy a firewall. Change the password frequently.

18. Your friend installs security patches on his computer. Which of the following benefits will these security patches provide? A. B. C. D. Protecting the computer from malicious attacks Updating the antivirus program Creating periodic backups Preventing spam e-mail messages

Objective 2.2 Identify the various means of securing online and network transact ions. 19. Robert works for Blue Yonder Airlines. Managers of his organization notice t hat some employees use corporate applications for unethical purposes. Which of the following tools can managers use to check this unethical practice? A. B. C. D. Antivirus program Spyware Cookies Firewall

20. Tony wants to purchase books from a Web site. Which of the following will ensure that the Web site is secure for online transa ctions? A. B. C. D. Microsoft® Windows® Firewall Secure Sockets Layer (SSL) Cookies Antivirus program

21. Your friend wants to know about Secure Sockets Layer (SSL). What will you explain to him? A. B. C. D. A means of checking if a document on the Web is genuine A standard and a secure way of presenting information A means to validate the identity of the user who accesses a Web site A standard for encoding information that is sent over the Web

22. Syed visits his friend Karen. He uses her computer to perform multiple banki ng transactions online. He wants to ensure that after he leaves, no one else can know which Web sites he visited. Which of the following actions will he perform to ensure this? Select three. A. B. C. D. E. F. G. Enable active content Disable Microsoft® Windows® Firewall Delete cookies Reset Web settings Clear browser cache Empty Recycle Bin Clear history

23. Apurva Dalia wants to set a password for his online banking account. Which of the following passwords is a strong password? A. B. C. D. Password ABC ApurvaDalia ADalia#175

24. Your friend wants to know about the methods for securing online and network transactions. Which of the following methods will you suggest to her? Select two. A. B. C. D. E. Check history files. Disable Automatic Updates. Enable Microsoft® Windows® Firewall. Use strong passwords. Enable active content.

Objective 2.3 Identify the common measures for securing e-mail and instant messa ging transactions. 25. Viktor likes to exchange e-mail messages with his friends. Every day, he rec eives many messages with attachments. Viktor wants to protect his computer from virus attacks by e-mail. Which of the following guidelines will Viktor apply to protect his computer? A. B. C. D. Reply to spam e-mail messages Copy attachments to his computer before opening them. Avoid opening e-mail attachments from unknown users. Reinstall the e-mail client periodically.

26. Your friend uses instant messaging to chat with friends. He wants to ensure that his instant messaging transactions are secure. Which of the following guidelines will you suggest? A. B. C. D. Chat with only one user at a time. Use different programs to chat with different users Open attachments received over chat. Chat with known users.

27. You receive an e-mail message from an unknown user. This message includes an .exe file as an attachment. What will you do with this message? A. B. C. D. Install the .exe file. Save the attachment on your computer. Delete the message. Move the message to another folder.

28. Manish wants to know about some common guidelines for securing e-mail transa ctions. Which of the following guidelines will you suggest to him? A. B. C. D. Archive e-mail messages that include attachments. Save junk e-mail messages in a separate folder. Reply to spam e-mail messages. Delete e-mail messages that include attachments from unknown users.

29. Milena receives several e-mail messages in a day. Her mailbox holds messages from her bank, Internet service provider (ISP), and friends. She also has unsol icited messages about products and discounts. Which of the following messages in Milena's mailbox is a spam message? A. B. C. D. Account details from her bank E-mail account details from her ISP Commercial information from an unknown sender A message from a friend that includes family pictures

Lesson 3: Protecting Identify the common measures used to protect privacy.

Objective 3.1 Identify the common measures used to protect privacy. 30. Your friend wants to ensure that his project data is secure and can be resto red in case of an environmental disaster. Which of the following measures will you suggest to him? A. B. C. D. Maintain a backup in a secure location. Update the antivirus program. Use Microsoft® Windows® Update. Install an anti-spywarespyware-fighting program.

31. You receive an e-mail message from an unknown e-mail address. The message re quests you to share your credit card details to receive a discount on some music CDs. What will you do with this message? A. B. C. D. Reply to the message to provide your credit card details. Encrypt the message. Scan the message for viruses. Delete the message.

32. Karim wants to send confidential information over e-mail to his colleague. Which of the following measures will he apply to ensure the privacy of the e-mai l message? A. B. C. D. Use an anti-spywarespyware-fighting program. Encrypt the e-mail message. Use e-mail filters. Maintain a backup of the e-mail message.

33. Gloria uses the Internet frequently for online purchasing. To protect her sy stem from virus attacks, she installs an antivirus program. However, within a fe w days, she gets a virus alert on her system. Which of the following measures will she implement to prevent this virus in the future? A. B. C. D. Update and run virus scans daily. Update the Internet browser. Check Microsoft® Windows® Update. Use a strong password.

34. You want to encrypt a confidential e-mail message before you send it to your colleague.

Which of the following programs will you use to encrypt the message? A. B. C. D. Firewall Spyware Microsoft® Office Outlook®2003 Microsoft® Windows® Update

35. Pia wants to verify that the system she is using is updated with the latest security patches. Which of the following options will she use to check these settings? A. B. C. D. Microsoft® Microsoft® Microsoft® Microsoft® Outlook® Express Office Outlook® 2003 Office Windows® Update

36. You want to purchase DVDs from a Web site. Which of the following options will you use to verify that the Web site is secur e for online transactions? A. B. C. D. Encryption tool Automatic Updates icon Locked padlock icon Internet service provider (ISP) logo

37. Lina is unable to access the e-mail account that her Internet service provid er (ISP) provides. She realizes that someone has hacked into her account. What action will she take to remedy this issue? A. B. C. D. Protect her computer from surges and spikes Use Microsoft® Windows® Update Install spyware Report the incident to her ISP

Objective 3.3 Identify the guidelines to protect your children from online preda tors. 38. You want to educate your family about the signs of an online predator. Which of the following signs will you share with your family? A. B. C. D. Sends viruses Tries to involve you in a relationship Steals passwords Sends junk e-mail messages

39. Naoki notices that his teenage children like to chat online. Which of the following guidelines will Naoki recommend to ensure their safety fr om online predators? A. B. C. D. Chat only with people they know. Use private chat areas. Install multiple chat programs. Chat with one person at a time.

40. Your children need to access the Internet frequently. Therefore, you install an Internet connection on your computer. Which of the following precautions will you take when your children access the I nternet? A. B. C. D. Regularly Block Web Block all Recommend check the Web sites your children visit. sites that offer free e-mail accounts. search engines. use of chat rooms instead of e-mail.

41. Your niece uses the Internet frequently. You want to block some Web sites th at are inappropriate for her age group. How will you block these Web sites? A. B. C. D. Update the antivirus program. Install spyware. Use filter programs. Check Microsoft® Windows® Update.

42. Tamer's children use the Internet to chat with their friends. He wants to pr otect his children from online predators. Which of the following guidelines will you recommend? A. B. C. D. Update the operating system Deploy a firewall. Block Web sites that offer free chat programs. Set up a program that monitors online chat.

43. You see your friend chatting with an unknown user. Which of the following guidelines will you recommend to ensure safety over chat? A. B. C. D. Close the chat program. Reply to users who seek your personal information. Share personal information only with people you trust. Use private chat areas.

44. Kitti receives an e-mail message from an unknown e-mail address offering dis counts on game CDs. As specified in the message, Kitti needs to share his name, age, and contact information to receive the discount.

Which of the following actions does Kitti need to take? A. B. C. D. Send his personal information to receive the discount. Delete the e-mail message. Use an anti-spywarespyware-fighting program. Forward the e-mail message to friends.

Lesson 4: Keeping Your Computer Secure and Updated Objective 4.1 Explain the purpose of different security settings on your compute r. 45. Jim discovers that his son visits Web sites that are inappropriate for his a ge. Jim wants to restrict access to these sites. Which of the following security settings will help Jim to block these sites? A. B. C. D. Microsoft® Windows® Firewall Internet Options Automatic Updates Antivirus Options

46. Jack is annoyed with the pop-up messages that appear whenever he visits a We b site. He wants to block all of the pop-up messages. Which of the following security settings will help him to block all of the pop-u p messages? A. Automatic Updates B. Microsoft® Windows® Firewall C. Antivirus Options D. Internet Options 47. Martin wants to set Microsoft® Windows® to automatically check for the latest se curity patches released by Microsoft. Which security settings will he use to check for the latest security patches at periodic intervals? A. B. C. D. Internet Options Microsoft Windows Firewall Automatic Updates Antivirus Updates

48. Bill wants to understand the purpose of Microsoft® Windows® Firewall. Which of the following options states the purpose of Windows Firewall? A. B. C. D. Installs security patches Restricts unauthorized access Blocks pop-up messages Blocks Web sites

49. Jim wants to block a Web site. Which of the following Internet Properties tabs will he use to do this?

A. B. C. D.

Security Content Privacy Connections

Lesson 5: Computer Ethics Objective 5.1 Explain what the terms Intellectual Property and copyright mean as they apply to computing. 50. While reading a novel, you realize that the author has copied material from another author. How will you categorize this violation? A. B. C. D. Phishing Plagiarism Libel Slander

51. Monica recently heard about copyright. She wants to know what actions violat e copyright. Which one of the following actions is a copyright violation? A. B. C. D. Sharing Reading Copying Quoting a Web site address material from a publicly available Web site software and distributing it to your friends a paragraph and mentioning the source

52. For a project, Bill decides to use content from a Web site. However, he forg ets to state the source. What has Bill done? A. B. C. D. Libel Plagiarism Gambling Defamation

53. Ken decides to download the latest song from his favorite band from a public ly available Web site and share it with his friends. What is Ken doing? A. B. C. D. Breaching copyright Breaching security Slandering the singer Violating privacy

Objective 5.2 Identify the various legal concerns associated with information ex change. 54. Glenn notices that his colleague is making false statements about him in an

online public forum. What is Glenn's colleague doing? A. B. C. D. Plagiarism Defamation Gambling Phishing

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close