
Exam Review: Safe Computing
Authored by Joe Duncan
Computers
9th - 12th Grade
Used 45+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
6 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is most likely to be a data privacy concern for StreamPal users?
Users of the application are required to rate songs in order to enable all of the application’s features.
Users of the application may have the ability to determine information about the locations of users that are not on their contact list.
Users of the application may not be able to use the application if they are located in an area with a poor Internet connection.
Users of the application may not have similar music taste to any other users on their contact list.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following statements is most likely true about the differences between the basic version and the premium version of StreamPal?
Users of the basic version of StreamPal are more likely to give songs higher ratings than are users of the premium version of StreamPal.
Users of the basic version of StreamPal indirectly support StreamPal by allowing themselves to receive advertisements.
Users of the basic version of StreamPal spend more on monthly fees than do users of the premium version of StreamPal.
Users of the basic version of StreamPal use less data storage space on their devices than do users of the premium version of StreamPal.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user unintentionally installs keylogging software on a computer. Which of the following is an example of how the keylogging software can be used by an unauthorized individual to gain access to computing resources?
The software gives an unauthorized individual remote access to the computer, allowing the individual to search the computer for personal information.
The software installs a virus on the computer and prompts the user to make a payment to the unauthorized individual to remove the virus.
The software prompts the user to enter personal information to verify the user’s identity. This personal information is recorded and transmitted to an unauthorized individual.
The software records all user input on the computer. The recorded information is transmitted to an unauthorized individual, who analyzes it to determine the user’s login passwords.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An individual receives an e-mail that appears to be from an insurance company. The message offers a low insurance rate, and prompts the recipient to click a link to learn more. Which of the following is most indicative that the e-mail is part of a phishing attempt?
After clicking the link, a browser cookie is downloaded to the recipient’s computer.
After clicking the link, a Web page opens that prompts the recipient for personal information.
After clicking the link, the recipient’s private network becomes publicly visible via a rogue access point.
After clicking the link, software is installed on the recipient’s computer that records every keystroke made on the computer.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A city’s police department has installed cameras throughout city streets. The cameras capture and store license plate data from cars driven and parked throughout the city. The authorities use recorded license plate data to identify stolen cars and to enforce parking regulations.
Which of the following best describes a privacy risk that could occur if this method of data collection is misused?
The cameras may not be able to read license plates in poor weather conditions.
Local business owners could lose customers who are unwilling to park in the city.
Traffic personnel who work for the city could lose their jobs if their services are no longer needed.
The vehicle location data could be used to monitor the movements of city residents.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best exemplifies the use of multifactor authentication?
A computing device enables users to input information using multiple interfaces, including a keyboard, a mouse, and a touch pad.
A user employs a public key encryption method that uses one key to encrypt information and a different key to decrypt information.
A Web site requires a user to enter a password as well as a numeric code received via text message before the user can log in to an account.
Multiple users share an account to a Web-based software program, and each user has an individual username and password.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?