0% found this document useful (0 votes)
17 views

chapter_05_Digital Security, Ethics, and Privacy Avoiding and recognizing threats_questions

The document is a quiz on digital security, ethics, and privacy, consisting of multiple-choice questions related to various concepts such as Wi-Fi security, authentication, and disaster recovery plans. It covers topics like the 'evil twin' Wi-Fi network, biometric security, and the Internet of Things (IoT). The questions aim to assess knowledge on recognizing threats and implementing security measures in digital environments.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views

chapter_05_Digital Security, Ethics, and Privacy Avoiding and recognizing threats_questions

The document is a quiz on digital security, ethics, and privacy, consisting of multiple-choice questions related to various concepts such as Wi-Fi security, authentication, and disaster recovery plans. It covers topics like the 'evil twin' Wi-Fi network, biometric security, and the Internet of Things (IoT). The questions aim to assess knowledge on recognizing threats and implementing security measures in digital environments.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

BTELED ICT 4 – Introduction to ICT Specialization 1

Chapter 5 – Digital Security, Ethics, and Privacy: Avoiding and


Recognizing Threats
GROUP 4
/ /
(Last Name) (First Name) (MI) Date / Month / Year

I. Write the letter of your answer on the blank space provided. (1 point each)

1.) What is the normal-looking yet fraudulent Wi-Fi network that allows hackers to capture personal
information users transmit?
a. cloud data
b. cloud security alliance (CSA)
c. evil twin
d. injecting malware

2.) It allows the configuration settings to be changed from anywhere through internet connection.
a. access management
b. remote management
c. service set identifier (SSID)
d. Wi-Fi protected access 2 (WPA2) personal

3.) This requires a password to access the configuration settings of the device.
a. access management
b. remote management
c. service set identifier (SSID)
d. Wi-Fi protected access 2 (WPA2) personal

4.) It simplifies setting up the security on a wireless router.


a. guest access
b. service set identifier (SSID)
c. Wi-Fi protected access 2 (WPA2) personal
d. Wi-Fi protected setup (WPS)

5.) The process of ensuring that the person requesting access to a computer or other resources is authentic
and not an impostor is called ____?
a. authentication
b. MAC address
c. password
d. username

6.) It is a unique hardware identifier for your computer or device.


a. authentication
b. MAC address
c. password
d. username

7.) This is also called a user ID (Identification), log on name, or sign in name.
a. authentication
b. MAC address
c. password
d. username

8.) A secret combination of letters, numbers and/or characters that only the user should know is called
____?
a. authentication
b. MAC address
c. password
d. username

Page 1 of 4
9.) These are the risks from attacks on Wi-Fi networks EXCEPT____?
a. evil twin
b. injecting malware
c. reading wireless transmission
d. viewing or stealing computer

10.) Which type of malware could attackers inject into a user’s computer through an unprotected
wireless network?
a. networks configuration tools
b. spyware and adware
c. system drivers
d. trojan horses, viruses, and other malware
11.) A private combination of words, often containing mixed capitalization, and punctuation
associated with username that allows access certain computer resources is called ____?
a. fingerprint
b. passphrase
c. password
d. pin
12.) A numeric password either assigned by company or select by a user is called ____?
a. fingerprint
b. passphrase
c. password
d. pin
13.) A verification system recognizes the shape of handwritten is called ____?
a. passphrase
b. password
c. pin
d. signature
14.) It is a biometric authentication that is becoming increasingly popular on smartphones that
uses facial expressions.
a. face authentication
b. hand
c. password
d. pin
15.) It consists of unique patterns and valleys.
a. face authentication
b. fingerprint
c. passphrase
d. signature
16.) Which type of biometric can be used to authenticate based on the unique characteristics of a
person’s voice?
a. facial recognition
b. hand geometry
c. iris
d. voice recognition
17.) It is often use in larger companies to track worker’s time and attendance or security device.
a. facial recognition
b. hand geometry
c. iris
d. voice recognition
18.) It is a thin, circular structure in the eye which can use as a standard computer webcam.
a. facial recognition
b. hand geometry
c. iris

Page 2 of 4
d. voice recognition

19.) The security that uses the unique characteristics of your face, hands, or eyes to
authenticate you is called ____?
a. biometric security
b. password
c. passphrase
d. pin

20.) It is an electronic, encrypted, and secure stamp of authentication of documents.

a. biometric security
b. browser security
c. decryption
d. digital signature

21.) Which of the following is a plan that contains four components?

a. backup plan
b. disaster recovery plan
c. emergency plan
d. test plan

22.) A program that restricts access to specified websites is called ?


a. content filtering
b. disaster recovery
c. privacy laws
d. web filtering software

23.) Using computers, mobile devices or camera’s to documents the employee’s activities is called ____?
a. code of conduct
b. content monitoring
c. employee monitoring
d. privacy laws

24.) It is a component of a disaster recovery plan that will take as soon as disaster strikes.
a. backup plan
b. emergency plan
c. recovery plan
d. test plan

25.) It is a component of a disaster recovery plan that will use backup files and equipment to resume
computer operations.
a. backup plan
b. emergency plan
c. recovery plan
d. test plan

26.) It is a component of a disaster recovery plan that insures full computer operations after a disaster.
a. backup plan
b. emergency plan
c. recovery plan
d. test plan

27.) It is a component of a disaster recovery plan that includes simulating various levels of disasters.
a. backup plan
b. emergency plan
c. recovery plan
d. test plan

28.) What does IoT stand for?

Page 3 of 4
a. internet of technology
b. internet of themes
c. internet of things
d. internet of trade

29.) What is a written guideline that would take to restore its computer operations in the event of
disaster?
a. digital inclusion
b. disasters recovery plan
c. establishing policies
d. privacy law

30.) The process of restricting access to certain material is called ____?


a. content filtering
b. disaster recovery
c. material filtering
d. privacy law

Page 4 of 4

You might also like