What should individuals consider regarding expectations of privacy when using social networking sites?
Security IV

Quiz
•
Computers
•
11th Grade
•
Medium
Sandra Battle
Used 3+ times
FREE Resource
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Sharing personal information with unknown individuals
posting sensitive customer information publicly
Ensuring privacy settings are configured appropriately
sharing confidential information through instant messaging
Answer explanation
It is essential to review and configure privacy settings on social networking sites to control who can access personal information. By adjusting privacy settings, individuals can limit the visibility of their posts, personal details, and other sensitive information, helping to protect their privacy and control the audience for their content. Sharing confidential information through instant messaging on social networking sites is highly risky and can lead to data breaches. Confidential information should be shared through secure channels, such as encrypted communication platforms or trusted business communication tools, to ensure its confidentiality and protect against unauthorized access. Individuals should exercise caution when sharing personal information on social networking sites, especially with unknown individuals. Sharing personal details publicly can lead to privacy breaches and potentially compromise personal safety and security. It is important to be mindful of the information shared and restrict it to trusted connections. Posting sensitive customer information publicly on social networking sites is a violation of privacy and confidentiality. Individuals should never disclose customer information without proper authorization or in a manner that compromises privacy regulations or agreements.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why should sensitive business information such as product designs, marketing plans, and financial details be stored on media subject to network access controls and/or encryption?
To comply with data transparency regulations.
To prevent unauthorized disclosure .
to free up storage space on servers
to ensure faster access to the information.
Answer explanation
Sensitive business information should be stored on media with network access controls and/or encryption to prevent unauthorized disclosure. This helps to maintain the confidentiality and integrity of the information. While managing server storage is an important aspect of IT, network access controls and encryption do not directly free up storage space. In reality, encryption and network access controls don't necessarily make accessing information faster. Instead, they focus on data security. Data transparency usually requires organizations to make certain types of data readily available, which could be at odds with the goal of preventing unauthorized access to sensitive information.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following are considered safe browsing practices to protect against online threats? (Select TWO).
Sharing personal information on unsecured websites.
Regularly updating web browsers and using strong, unique passwords.
Clicking on pop-up advertisements to claim prizes
Downloading files from untrusted websites without canning them,.
Avoiding clicking on suspicious or unfamiliar links.
Answer explanation
Regularly updating web browsers ensures that security patches and enhancements are applied, reducing the risk of vulnerabilities. Using strong, unique passwords for online accounts helps protect against unauthorized access. Both practices contribute to a safer browsing experience and are considered safe browsing practices. Clicking on suspicious or unfamiliar links can lead to phishing websites or malicious content. It is important to exercise caution and avoid clicking on such links to maintain a safe browsing experience. Sharing personal information on unsecured websites increases the risk of data breaches and identity theft. It is important to only provide personal information on secure websites that use encryption. Downloading files from untrusted websites without scanning them increases the risk of downloading malware or viruses. It is crucial to download files only from trusted sources and scan them with antivirus software before opening or executing them. Clicking on pop-up advertisements is risky, as they may contain malicious content or lead to phishing websites. It is important to avoid clicking on such ads to maintain a safe browsing experience. Disabling security software exposes the system to various online threats. It is not a safe browsing practice and compromises the security of the system.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can data in transit be secured using a Virtual Private Network (VPN)?
By encrypting the network traffic between two locations,
by encrypting email messages during transmissions.
by encrypting data stored on a mobile device
by encrypting files and folders on a computer.
Answer explanation
When using a Virtual Private Network (VPN), the network traffic between two locations is encrypted, ensuring that the data in transit remains secure and protected from unauthorized access. While email encryption is a valid method to secure email messages, it does not specifically pertain to securing data in transit using a VPN. Encrypting files and folders on a computer is a form of data at rest encryption, which focuses on protecting data stored on a device rather than data during transmission. Encrypting data stored on a mobile device is another form of data at rest encryption and does not specifically address securing data during transmission.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following practices is MOST critical when engaging in file sharing?
Keeping files public for ease of access.
Respecting privacy expectations and adhering to written policies and procedures.
Sharing files only on trusted platforms.
Ignoring written policies and procedures.
Answer explanation
When engaging in file sharing, it is crucial to respect the privacy expectations of others and adhere to written policies and procedures. This practice safeguards sensitive information and prevents unauthorized access. While sharing files only on trusted platforms is important, it does not encapsulate the whole behavioral security approach. This practice may compromise security and privacy, contradicting behavioral security concepts that prioritize the privacy and confidentiality of data. This practice jeopardizes security and privacy, defying the behavioral security concept of adhering to established policies and procedures.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What feature of an antivirus software allows users to configure regular system scans at specific times or intervals?
Quarantining and remediation infects d systems
Scheduled scans
on-access scanning
Heuristic analysis
Answer explanation
Scheduled scans allow users to configure the antivirus software to perform regular scans at specific times or intervals. This feature ensures that the system is periodically checked for malware infections, even when the user may not be actively using the computer. On-access scanning is the feature of an antivirus software that automatically scans files and programs in real-time as they are accessed or downloaded. It provides immediate protection against malware threats, but it does not specifically refer to configuring regular system scans at specific times or intervals. Quarantining and remediating infected systems is a feature that isolates detected malware and removes or repairs it. While important for handling infected files, it is not the specific feature related to configuring regular system scans. Heuristic analysis is a technique used by antivirus software to detect previously unknown or zero-day malware based on behavioral patterns. While an important feature, it is not directly related to configuring scheduled scans.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of replicating data between servers and potentially between sites?
To reduce network traffic
To enhance network speed
To ensure service continuity and data availability in case of a disruption.
To increase data storage capacity
Answer explanation
Data replication, whether real-time or periodic, ensures that an up-to-date copy of data is available at all times, allowing for service continuity and data availability in case of a disruption. Data replication doesn't reduce network traffic. In fact, it might increase network traffic due to the continuous or periodic syncing of data. Replication does not increase data storage capacity. It creates copies of data across servers or sites for redundancy purposes. Replication does not directly enhance network speed. It is primarily aimed at ensuring data availability and service continuity.
Create a free account and access millions of resources
Similar Resources on Quizizz
20 questions
Unit 4 Vocabulary - AP CSP

Quiz
•
9th - 12th Grade
17 questions
08 - Protecting Yourself QUIZ

Quiz
•
9th - 12th Grade
20 questions
Ethical, Legal and Social Issues of Computing

Quiz
•
9th - 11th Grade
11 questions
30. Ethical_Legal_Enviro CS Legislation Quiz

Quiz
•
9th - 12th Grade
10 questions
Computer System - Data Capturing & Storage

Quiz
•
11th Grade
13 questions
J277 1.4 Network Security Quiz (Threats)

Quiz
•
9th - 12th Grade
10 questions
Studio - U3 - LO1-1.2 Types of Cyber Security incidents

Quiz
•
9th Grade - University
15 questions
As/A Level CS 9Chpt_6: Security, Privacy, and Integrity of Data

Quiz
•
11th Grade
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade
Discover more resources for Computers
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Taxes

Quiz
•
9th - 12th Grade
17 questions
Parts of Speech

Quiz
•
7th - 12th Grade
20 questions
Chapter 3 - Making a Good Impression

Quiz
•
9th - 12th Grade
20 questions
Inequalities Graphing

Quiz
•
9th - 12th Grade
10 questions
Identifying equations

Quiz
•
KG - University