Unit 4 #7

Unit 4 #7

Assessment

Quiz

Created by

Clifford Buckles

Chemistry

12th Grade

6 plays

Easy

Student preview

quiz-placeholder

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best exemplifies the use of multifactor authentication to protect an online banking system?

When a user resets a password for an online bank account, the user is required to enter the new password twice.

When multiple people have a shared online bank account, they are each required to have their own unique username and password.

After entering a password for an online bank account, a user must also enter a code that is sent to the user’s phone via text message.

An online bank requires users to change their account passwords multiple times per year without using the same password twice.


2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In public key cryptography, the sender uses the recipient’s public key to encrypt a message. Which of the following is needed to decrypt the message?

Responses


The sender’s public key

The sender’s private key

The recipient’s public key


The recipient’s private key

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following scenarios best exemplifies a phishing attack?

Responses


A user connects to a public wireless network. An unauthorized individual intercepts data transmitted on the network, looking for private information that can be used to gain access to the user’s accounts.

A user’s e-mail account is overwhelmed with messages containing large attachments, which causes the account to exceed the maximum amount of data allowed and temporarily prevents the user from sending and receiving new messages.

A user receives an e-mail from a sender offering technical help with the user’s computer. The e-mail prompts the user to start a help session by clicking a provided link and entering the username and password associated with the user’s computer.

A user chooses a weak password for an online account. An unauthorized individual successfully guesses the user’s password from a list of common passwords.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A city’s police department has installed cameras throughout city streets. The cameras capture and store license plate data from cars driven and parked throughout the city. The authorities use recorded license plate data to identify stolen cars and to enforce parking regulations.

Which of the following best describes a privacy risk that could occur if this method of data collection is misused?

The cameras may not be able to read license plates in poor weather conditions.

Local business owners could lose customers who are unwilling to park in the city.

Traffic personnel who work for the city could lose their jobs if their services are no longer needed.

The vehicle location data could be used to monitor the movements of city residents.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following has the greatest potential for compromising a user’s personal privacy?

A group of cookies stored by the user’s Web browser

The Internet Protocol (IP) address of the user’s computer

The user’s e-mail address


The user’s public key used for encryption

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of symmetric encryption?

Responses


Evy buys a locked box that operates using two different codes. When the first code is entered, a slot opens that allows a message to be put in the box. When the second code is entered, the door to the box opens. Evy gives the first code to her friends so they can leave messages for her and keeps the second code to herself so that she is the only one who can retrieve the messages.

Finn and Gwen develop a system that maps each letter of the alphabet to a unique symbol using a secret key. Finn uses the key to write a message to Gwen where each letter is replaced with the corresponding symbol. Gwen uses the key to map each symbol back to the original letter.

Hannah writes a message to send to Isabel and hides the message under a rock behind the soccer field. Hannah gives Isabel the exact location of the rock so that only Isabel can find the message.

Juan writes a message to send to Kelly and slides the message through a slot in the front of Kelly’s locker. Juan knows that Kelly has not shared her locker combination with anyone, so no one other than Kelly will be able to read the message.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Many Web browsers allow users to open anonymous windows. During a browsing session in an anonymous window, the browser does not record a browsing history or a list of downloaded files. When the anonymous window is exited, cookies created during the session are deleted. Which of the following statements about browsing sessions in an anonymous window is true?

The activities of a user browsing in an anonymous window will not be visible to people who monitor the user’s network, such as the system administrator.

Items placed in a Web store’s shopping cart for future purchase during the anonymous browsing session will not be saved on the user’s computer.

A user will not be able to log in to e-mail or social media accounts during the anonymous browsing session.


A user browsing in an anonymous window will be protected from viruses launched from any Web sites visited or files downloaded.

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

RunRoutr is a fitness tracking application for smartphones that creates suggested running routes so that users can run with each other. Upon downloading the application, each user creates a username, a personal profile, and a contact list of friends who also use the application. The application uses the smartphone’s GPS unit to track a user’s location, running speed, and distance traveled. Users can use the application to review information and statistics about their previous runs.

At the beginning of a run, users indicate the distance they want to run from their current location, and the application suggests a running route. Once a user accepts a suggested route, the application shares the suggested route with other compatible users in the area so that they can run together. Users are considered compatible if they are on each other’s contact lists or if they typically run at similar speeds.

A basic RunRoutr account is free, but it displays advertisements that are targeted to individual users based on data collected by the application. For example, if a user’s running route begins or ends near a particular store, the application may display an advertisement for that store. Users have the ability to pay a monthly fee for a premium account, which removes advertisements from the application.

Users of the application are required to carry their smartphones with them while running in order to enable all of the application’s features.

Users of the application may have the ability to determine information about the locations of users that are not on their contact lists.

Users of the application may not be able to accurately track their running history if they share their smartphone with another family member.

Users of the application may not be compatible with any other users in their area.

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A Web site uses several strategies to prevent unauthorized individuals from accessing user accounts. Which of the following is NOT an example of multifactor authentication?

Each employee for a company is issued a USB device that contains a unique token code. To log into a company computer, an employee must insert the USB device into the computer and provide a correct password.

After logging into an account from a new device, a user must enter a code that is sent via e-mail to the e-mail address on file with the account.

In order to log into an account, a user must provide both a password and a fingerprint that is captured using the user’s device.


When a user enters an incorrect password more than two times in a row, the user is locked out of the account for 24 hours.

10.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following are true statements about digital certificates in Web browsers?

  1. -Digital certificates are used to verify the ownership of encrypted keys used in secured communication.

  2. -Digital certificates are used to verify that the connection to a Web site is fault tolerant.


I only


II only

I and II


Neither I nor II

Explore all questions with a free account

or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?