Search Header Logo

Exam Review: Safe Computing

Authored by Joe Duncan

Computers

9th - 12th Grade

Used 45+ times

Exam Review: Safe Computing
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which of the following is most likely to be a data privacy concern for StreamPal users?

Users of the application are required to rate songs in order to enable all of the application’s features.

Users of the application may have the ability to determine information about the locations of users that are not on their contact list.

Users of the application may not be able to use the application if they are located in an area with a poor Internet connection.

Users of the application may not have similar music taste to any other users on their contact list.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which of the following statements is most likely true about the differences between the basic version and the premium version of StreamPal?

Users of the basic version of StreamPal are more likely to give songs higher ratings than are users of the premium version of StreamPal.

Users of the basic version of StreamPal indirectly support StreamPal by allowing themselves to receive advertisements.

Users of the basic version of StreamPal spend more on monthly fees than do users of the premium version of StreamPal.

Users of the basic version of StreamPal use less data storage space on their devices than do users of the premium version of StreamPal.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user unintentionally installs keylogging software on a computer. Which of the following is an example of how the keylogging software can be used by an unauthorized individual to gain access to computing resources?

The software gives an unauthorized individual remote access to the computer, allowing the individual to search the computer for personal information.

The software installs a virus on the computer and prompts the user to make a payment to the unauthorized individual to remove the virus.

The software prompts the user to enter personal information to verify the user’s identity. This personal information is recorded and transmitted to an unauthorized individual.

The software records all user input on the computer. The recorded information is transmitted to an unauthorized individual, who analyzes it to determine the user’s login passwords.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An individual receives an e-mail that appears to be from an insurance company. The message offers a low insurance rate, and prompts the recipient to click a link to learn more. Which of the following is most indicative that the e-mail is part of a phishing attempt?

After clicking the link, a browser cookie is downloaded to the recipient’s computer.

After clicking the link, a Web page opens that prompts the recipient for personal information.

After clicking the link, the recipient’s private network becomes publicly visible via a rogue access point.

After clicking the link, software is installed on the recipient’s computer that records every keystroke made on the computer.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A city’s police department has installed cameras throughout city streets. The cameras capture and store license plate data from cars driven and parked throughout the city. The authorities use recorded license plate data to identify stolen cars and to enforce parking regulations.


Which of the following best describes a privacy risk that could occur if this method of data collection is misused?

The cameras may not be able to read license plates in poor weather conditions.

Local business owners could lose customers who are unwilling to park in the city.

Traffic personnel who work for the city could lose their jobs if their services are no longer needed.

The vehicle location data could be used to monitor the movements of city residents.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best exemplifies the use of multifactor authentication?

A computing device enables users to input information using multiple interfaces, including a keyboard, a mouse, and a touch pad.

A user employs a public key encryption method that uses one key to encrypt information and a different key to decrypt information.

A Web site requires a user to enter a password as well as a numeric code received via text message before the user can log in to an account.

Multiple users share an account to a Web-based software program, and each user has an individual username and password.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?