Which of the following best exemplifies the use of multifactor authentication to protect an online banking system?
Unit 4 #7

Quiz
•
Clifford Buckles
•
Chemistry
•
12th Grade
•
6 plays
•
Easy
Student preview

10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When a user resets a password for an online bank account, the user is required to enter the new password twice.
When multiple people have a shared online bank account, they are each required to have their own unique username and password.
After entering a password for an online bank account, a user must also enter a code that is sent to the user’s phone via text message.
An online bank requires users to change their account passwords multiple times per year without using the same password twice.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In public key cryptography, the sender uses the recipient’s public key to encrypt a message. Which of the following is needed to decrypt the message?
Responses
The sender’s public key
The sender’s private key
The recipient’s public key
The recipient’s private key
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following scenarios best exemplifies a phishing attack?
Responses
A user connects to a public wireless network. An unauthorized individual intercepts data transmitted on the network, looking for private information that can be used to gain access to the user’s accounts.
A user’s e-mail account is overwhelmed with messages containing large attachments, which causes the account to exceed the maximum amount of data allowed and temporarily prevents the user from sending and receiving new messages.
A user receives an e-mail from a sender offering technical help with the user’s computer. The e-mail prompts the user to start a help session by clicking a provided link and entering the username and password associated with the user’s computer.
A user chooses a weak password for an online account. An unauthorized individual successfully guesses the user’s password from a list of common passwords.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A city’s police department has installed cameras throughout city streets. The cameras capture and store license plate data from cars driven and parked throughout the city. The authorities use recorded license plate data to identify stolen cars and to enforce parking regulations.
Which of the following best describes a privacy risk that could occur if this method of data collection is misused?
The cameras may not be able to read license plates in poor weather conditions.
Local business owners could lose customers who are unwilling to park in the city.
Traffic personnel who work for the city could lose their jobs if their services are no longer needed.
The vehicle location data could be used to monitor the movements of city residents.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following has the greatest potential for compromising a user’s personal privacy?
A group of cookies stored by the user’s Web browser
The Internet Protocol (IP) address of the user’s computer
The user’s e-mail address
The user’s public key used for encryption
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of symmetric encryption?
Responses
Evy buys a locked box that operates using two different codes. When the first code is entered, a slot opens that allows a message to be put in the box. When the second code is entered, the door to the box opens. Evy gives the first code to her friends so they can leave messages for her and keeps the second code to herself so that she is the only one who can retrieve the messages.
Finn and Gwen develop a system that maps each letter of the alphabet to a unique symbol using a secret key. Finn uses the key to write a message to Gwen where each letter is replaced with the corresponding symbol. Gwen uses the key to map each symbol back to the original letter.
Hannah writes a message to send to Isabel and hides the message under a rock behind the soccer field. Hannah gives Isabel the exact location of the rock so that only Isabel can find the message.
Juan writes a message to send to Kelly and slides the message through a slot in the front of Kelly’s locker. Juan knows that Kelly has not shared her locker combination with anyone, so no one other than Kelly will be able to read the message.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Many Web browsers allow users to open anonymous windows. During a browsing session in an anonymous window, the browser does not record a browsing history or a list of downloaded files. When the anonymous window is exited, cookies created during the session are deleted. Which of the following statements about browsing sessions in an anonymous window is true?
The activities of a user browsing in an anonymous window will not be visible to people who monitor the user’s network, such as the system administrator.
Items placed in a Web store’s shopping cart for future purchase during the anonymous browsing session will not be saved on the user’s computer.
A user will not be able to log in to e-mail or social media accounts during the anonymous browsing session.
A user browsing in an anonymous window will be protected from viruses launched from any Web sites visited or files downloaded.
8.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
RunRoutr is a fitness tracking application for smartphones that creates suggested running routes so that users can run with each other. Upon downloading the application, each user creates a username, a personal profile, and a contact list of friends who also use the application. The application uses the smartphone’s GPS unit to track a user’s location, running speed, and distance traveled. Users can use the application to review information and statistics about their previous runs.
At the beginning of a run, users indicate the distance they want to run from their current location, and the application suggests a running route. Once a user accepts a suggested route, the application shares the suggested route with other compatible users in the area so that they can run together. Users are considered compatible if they are on each other’s contact lists or if they typically run at similar speeds.
A basic RunRoutr account is free, but it displays advertisements that are targeted to individual users based on data collected by the application. For example, if a user’s running route begins or ends near a particular store, the application may display an advertisement for that store. Users have the ability to pay a monthly fee for a premium account, which removes advertisements from the application.
Users of the application are required to carry their smartphones with them while running in order to enable all of the application’s features.
Users of the application may have the ability to determine information about the locations of users that are not on their contact lists.
Users of the application may not be able to accurately track their running history if they share their smartphone with another family member.
Users of the application may not be compatible with any other users in their area.
9.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A Web site uses several strategies to prevent unauthorized individuals from accessing user accounts. Which of the following is NOT an example of multifactor authentication?
Each employee for a company is issued a USB device that contains a unique token code. To log into a company computer, an employee must insert the USB device into the computer and provide a correct password.
After logging into an account from a new device, a user must enter a code that is sent via e-mail to the e-mail address on file with the account.
In order to log into an account, a user must provide both a password and a fingerprint that is captured using the user’s device.
When a user enters an incorrect password more than two times in a row, the user is locked out of the account for 24 hours.
10.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following are true statements about digital certificates in Web browsers?
-Digital certificates are used to verify the ownership of encrypted keys used in secured communication.
-Digital certificates are used to verify that the connection to a Web site is fault tolerant.
I only
II only
I and II
Neither I nor II
Explore all questions with a free account
Similar Resources on Quizizz
10 questions
Charles Gas Law

Quiz
•
9th - 12th Grade
10 questions
Charles Law

Quiz
•
9th - 12th Grade
15 questions
Carbon Quiz Y12

Quiz
•
12th Grade
15 questions
Saturated Hydrocarbons

Quiz
•
9th - 12th Grade
12 questions
Mastering Chemical Equation Balancing

Quiz
•
9th Grade - University
11 questions
Thermochemistry - Quiz 1

Quiz
•
10th - 12th Grade
11 questions
D.1 Pharmaceutical products & drug action

Quiz
•
12th Grade
15 questions
Charles and Boyles Law

Quiz
•
7th - 12th Grade
Popular Resources on Quizizz
17 questions
CAASPP Math Practice 3rd

Quiz
•
3rd Grade
20 questions
math review

Quiz
•
4th Grade
21 questions
6th Grade Math CAASPP Practice

Quiz
•
6th Grade
13 questions
Cinco de mayo

Interactive video
•
6th - 8th Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
10 questions
4th Grade Math CAASPP (part 1)

Quiz
•
4th Grade
45 questions
5th Grade CAASPP Math Review

Quiz
•
5th Grade
Discover more resources for Chemistry
20 questions
Types of Chemical Reactions

Quiz
•
9th - 12th Grade
13 questions
Nuclear Chemistry

Lesson
•
9th - 12th Grade
145 questions
Chemistry EOC Review

Quiz
•
10th - 12th Grade
16 questions
Gas Laws

Quiz
•
9th - 12th Grade
13 questions
Gas Laws

Lesson
•
9th - 12th Grade
120 questions
Chemistry Final Review

Quiz
•
9th - 12th Grade
11 questions
Coach book Lesson 12

Lesson
•
12th Grade
13 questions
Gas Laws

Lesson
•
10th - 12th Grade