chapter_05_Digital Security, Ethics, and Privacy Avoiding and recognizing threats_questions
chapter_05_Digital Security, Ethics, and Privacy Avoiding and recognizing threats_questions
I. Write the letter of your answer on the blank space provided. (1 point each)
1.) What is the normal-looking yet fraudulent Wi-Fi network that allows hackers to capture personal
information users transmit?
a. cloud data
b. cloud security alliance (CSA)
c. evil twin
d. injecting malware
2.) It allows the configuration settings to be changed from anywhere through internet connection.
a. access management
b. remote management
c. service set identifier (SSID)
d. Wi-Fi protected access 2 (WPA2) personal
3.) This requires a password to access the configuration settings of the device.
a. access management
b. remote management
c. service set identifier (SSID)
d. Wi-Fi protected access 2 (WPA2) personal
5.) The process of ensuring that the person requesting access to a computer or other resources is authentic
and not an impostor is called ____?
a. authentication
b. MAC address
c. password
d. username
7.) This is also called a user ID (Identification), log on name, or sign in name.
a. authentication
b. MAC address
c. password
d. username
8.) A secret combination of letters, numbers and/or characters that only the user should know is called
____?
a. authentication
b. MAC address
c. password
d. username
Page 1 of 4
9.) These are the risks from attacks on Wi-Fi networks EXCEPT____?
a. evil twin
b. injecting malware
c. reading wireless transmission
d. viewing or stealing computer
10.) Which type of malware could attackers inject into a user’s computer through an unprotected
wireless network?
a. networks configuration tools
b. spyware and adware
c. system drivers
d. trojan horses, viruses, and other malware
11.) A private combination of words, often containing mixed capitalization, and punctuation
associated with username that allows access certain computer resources is called ____?
a. fingerprint
b. passphrase
c. password
d. pin
12.) A numeric password either assigned by company or select by a user is called ____?
a. fingerprint
b. passphrase
c. password
d. pin
13.) A verification system recognizes the shape of handwritten is called ____?
a. passphrase
b. password
c. pin
d. signature
14.) It is a biometric authentication that is becoming increasingly popular on smartphones that
uses facial expressions.
a. face authentication
b. hand
c. password
d. pin
15.) It consists of unique patterns and valleys.
a. face authentication
b. fingerprint
c. passphrase
d. signature
16.) Which type of biometric can be used to authenticate based on the unique characteristics of a
person’s voice?
a. facial recognition
b. hand geometry
c. iris
d. voice recognition
17.) It is often use in larger companies to track worker’s time and attendance or security device.
a. facial recognition
b. hand geometry
c. iris
d. voice recognition
18.) It is a thin, circular structure in the eye which can use as a standard computer webcam.
a. facial recognition
b. hand geometry
c. iris
Page 2 of 4
d. voice recognition
19.) The security that uses the unique characteristics of your face, hands, or eyes to
authenticate you is called ____?
a. biometric security
b. password
c. passphrase
d. pin
a. biometric security
b. browser security
c. decryption
d. digital signature
a. backup plan
b. disaster recovery plan
c. emergency plan
d. test plan
23.) Using computers, mobile devices or camera’s to documents the employee’s activities is called ____?
a. code of conduct
b. content monitoring
c. employee monitoring
d. privacy laws
24.) It is a component of a disaster recovery plan that will take as soon as disaster strikes.
a. backup plan
b. emergency plan
c. recovery plan
d. test plan
25.) It is a component of a disaster recovery plan that will use backup files and equipment to resume
computer operations.
a. backup plan
b. emergency plan
c. recovery plan
d. test plan
26.) It is a component of a disaster recovery plan that insures full computer operations after a disaster.
a. backup plan
b. emergency plan
c. recovery plan
d. test plan
27.) It is a component of a disaster recovery plan that includes simulating various levels of disasters.
a. backup plan
b. emergency plan
c. recovery plan
d. test plan
Page 3 of 4
a. internet of technology
b. internet of themes
c. internet of things
d. internet of trade
29.) What is a written guideline that would take to restore its computer operations in the event of
disaster?
a. digital inclusion
b. disasters recovery plan
c. establishing policies
d. privacy law
Page 4 of 4