Download Question Info

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Mobile security wikipedia , lookup

Malware wikipedia , lookup

Unix security wikipedia , lookup

Outlook.com wikipedia , lookup

Next-Generation Secure Computing Base wikipedia , lookup

Hacker wikipedia , lookup

Windows Update wikipedia , lookup

Computer security wikipedia , lookup

Microsoft Security Essentials wikipedia , lookup

Social engineering (security) wikipedia , lookup

Computer and network surveillance wikipedia , lookup

Cybercrime countermeasures wikipedia , lookup

Cybercrime wikipedia , lookup

Transcript
Microsoft Digital Literacy
Security and Privacy
Test Item File
Lesson 1: An Overview of Computer Security and Privacy
Objective 2.1 Explain what the terms security and privacy mean as they apply to computing.
1. You accidentally delete a registry file. Now you cannot start your computer.
What kind of computer threat is this?
A.
B.
C.
D.
Spoofing
Phishing
Software piracy
Human error
2. Someone has tampered with your computer and erased data.
What kind of computer threat is this?
A.
B.
C.
D.
Physical theft
Security
Environmental
Spyware
3. You want a new stand-alone computer.
What will you do to prevent others from accessing your confidential data in this computer?
A.
B.
C.
D.
Use an uninterruptible power supply (UPS) and a surge protector.
Use a user name and password.
Back up data and save it in a different location.
Install a spyware program and an antivirus program.
4. Your computer does not work when it heats up.
What is affecting your computer in this case?
A.
B.
C.
D.
Hackers trying to access your computer
Firewall installed in your computer
Many programs opened simultaneously
Environment surrounding your computer
5. After a voltage fluctuation, your computer stops working.
What will you do to prevent this problem in the future?
A.
B.
C.
D.
Use a surge protector.
Install an antivirus program.
Use spyware.
Back up data.
6. Your friend is confused with the terms privacy and security. She comes to you with a list of
threats to computers.
Which of the following threats will you categorize as a threat to computer privacy?
A.
B.
C.
D.
Accidental erasure of data
Hardware failure
Damage to computer because of an earthquake
Theft of confidential data
7. There is a hurricane alert in your area.
Which one of the following actions will you take to protect the data in your computer?
A.
B.
C.
D.
Install a virus protection program.
Store the data in a safe location.
Install spyware-fighting software.
Install a firewall to prevent hacking.
8. Frequent power outages happen in your area.
How can you protect your computer from this when a power outage happens?
A.
B.
C.
D.
Use an uninterruptible power supply (UPS).
Use a firewall.
Use a surge protector.
Install an antivirus program.
9. You spilled coffee on your computer.
What kind of threat is this?
A.
B.
C.
D.
Human error
Natural disaster
Environmental threat
Hacking
10. You receive an e-mail message. The sender of the message claims to be a bank executive and
wants your personal information to open an account for you.
Which one of the following terms describes this activity?
A. Spoofing
B. Spying
C. Hacking
D. Phishing
11. You are unable to log on to your e-mail account. You realize that someone has changed the
password without your knowledge.
Which one of the following terms describes this activity?
A.
B.
C.
D.
Phishing
Spoofing
Spamming
Cracking
12. The system administrator informs you that a Trojan horse has infected your computer.
Which program did the system administrator use to determine this?
A.
B.
C.
D.
Microsoft® Windows® Firewall
Microsoft® Internet Explorer®
Antivirus
Uninterruptible power supply (UPS)
13. You cannot access a file in a computer that belongs to your friend.
What prevents you from accessing the file?
A.
B.
C.
D.
Spyware
Firewall
Antivirus
Uninterruptible power supply (UPS)
14. The network administrator informs you that Niraj is viewing inappropriate Web sites. A
program installed on Niraj's computer monitors his browsing activities without his knowledge.
What type of program is installed on Niraj's computer?
A.
B.
C.
D.
Antivirus
Microsoft Windows Update
Spyware
Firewall
Lesson 2: Protecting Your Computer and Your Data
Objective 2.1 Identify the various methods of protecting the operating system, software, and
data in your system.
15. Northwind Traders wants to grant network access only to specific employees.
Which of the following methods can help Northwind Traders restrict the use of the network?
A. Lock combination
B.. Data encryption
C. Data backup.
D. User identification
16. You need to go to an urgent meeting. You do not want your colleagues to use your computer
in your absence.
Which of the following methods will you use to ensure that no one uses your computer while
you are away?
A.
B.
C.
D.
Turn off the monitor.
Use Lock Computer button.
Use a firewall.
Install updates for your computer.
17. Tulin sets a password for her computer. However, she suspects that someone is accessing
her computer in her absence.
Which of the following methods will help Tulin ensure that nobody accesses her computer
without her permission?
A.
B.
C.
D.
Use an spyware-fighting program.
Update the operating system.
Deploy a firewall.
Change the password frequently.
18. Your friend installs security patches on his computer.
Which of the following benefits will these security patches provide?
A.
B.
C.
D.
Protecting the computer from malicious attacks
Updating the antivirus program
Creating periodic backups
Preventing spam e-mail messages
Objective 2.2 Identify the various means of securing online and network transactions.
19. Robert works for Blue Yonder Airlines. Managers of his organization notice that some
employees use corporate applications for unethical purposes.
Which of the following tools can managers use to check this unethical practice?
A.
B.
C.
D.
Antivirus program
Spyware
Cookies
Firewall
20. Tony wants to purchase books from a Web site.
Which of the following will ensure that the Web site is secure for online transactions?
A.
B.
C.
D.
Windows Firewall
Secure Sockets Layer (SSL)
Cookies
Antivirus program
21. Your friend wants to know about Secure Sockets Layer (SSL).
What will you explain to him?
A.
B.
C.
D.
A means of checking if a document on the Web is genuine
A standard and a secure way of presenting information
A means to validate the identity of the user who accesses a Web site
A standard for encoding information that is sent over the Web
22. Syed visits his friend Karen. He uses her computer to perform multiple banking transactions
online. He wants to ensure that after he leaves, no one else can know which Web sites he visited.
Which of the following actions will he perform to ensure this? Select three.
A.
B.
C.
D.
E.
F.
G.
Enable active content
Disable Windows Firewall
Delete cookies
Reset Web settings
Clear browser cache
Empty Recycle Bin
Clear history
23. Apurva Dalia wants to set a password for his online banking account.
Which of the following passwords is a strong password?
A.
B.
C.
D.
Password
ABC
ApurvaDalia
ADalia#175
24. Your friend wants to know about the methods for securing online and network transactions.
Which of the following methods will you suggest to her? Select two.
A. Check history files.
B. Disable Automatic Updates.
C. Enable Windows Firewall.
D. Use strong passwords.
E. Enable active content.
Objective 2.3 Identify the common measures for securing e-mail and instant messaging
transactions.
25. Viktor likes to exchange e-mail messages with his friends. Every day, he receives many
messages with attachments. Viktor wants to protect his computer from virus attacks by e-mail.
Which of the following guidelines will Viktor apply to protect his computer?
A.
B.
C.
D.
Reply to spam e-mail messages
Copy attachments to his computer before opening them.
Avoid opening e-mail attachments from unknown users.
Reinstall the e-mail client periodically.
26. Your friend uses instant messaging to chat with friends. He wants to ensure that his
instant messaging transactions are secure.
Which of the following guidelines will you suggest?
A.
B.
C.
D.
Chat with only one user at a time.
Use different programs to chat with different users
Open attachments received over chat.
Chat with known users.
27. You receive an e-mail message from an unknown user. This message includes an .exe file as
an attachment.
What will you do with this message?
A.
B.
C.
D.
Install the .exe file.
Save the attachment on your computer.
Delete the message.
Move the message to another folder.
28. Manish wants to know about some common guidelines for securing e-mail transactions.
Which of the following guidelines will you suggest to him?
A.
B.
C.
D.
Archive e-mail messages that include attachments.
Save junk e-mail messages in a separate folder.
Reply to spam e-mail messages.
Delete e-mail messages that include attachments from unknown users.
29. Milena receives several e-mail messages in a day. Her mailbox holds messages from her
bank, Internet service provider (ISP), and friends. She also has unsolicited messages about
products and discounts.
Which of the following messages in Milena's mailbox is a spam message?
A.
B.
C.
D.
Account details from her bank
E-mail account details from her ISP
Commercial information from an unknown sender
A message from a friend that includes family pictures
Lesson 3: Protecting Identify the common measures used to protect privacy.
Objective 3.1 Identify the common measures used to protect privacy.
30. Your friend wants to ensure that his project data is secure and can be restored in case of an
environmental disaster.
Which of the following measures will you suggest to him?
A.
B.
C.
D.
Maintain a backup in a secure location.
Update the antivirus program.
Use Microsoft® Windows® Update.
Install an spyware-fighting program.
31. You receive an e-mail message from an unknown e-mail address. The message requests you
to share your credit card details to receive a discount on some music CDs.
What will you do with this message?
A.
B.
C.
D.
Reply to the message to provide your credit card details.
Encrypt the message.
Scan the message for viruses.
Delete the message.
32. Karim wants to send confidential information over e-mail to his colleague.
Which of the following measures will he apply to ensure the privacy of the e-mail message?
A.
B.
C.
D.
Use an spyware-fighting program.
Encrypt the e-mail message.
Use e-mail filters.
Maintain a backup of the e-mail message.
33. Gloria uses the Internet frequently for online purchasing. To protect her system from virus
attacks, she installs an antivirus program. However, within a few days, she gets a virus alert on
her system.
Which of the following measures will she implement to prevent this virus in the future?
A.
B.
C.
D.
Update and run virus scans daily.
Update the Internet browser.
Check Windows Update.
Use a strong password.
34. You want to encrypt a confidential e-mail message before you send it to your colleague.
Which of the following programs will you use to encrypt the message?
A.
B.
C.
D.
Firewall
Spyware
Microsoft® Office Outlook®2003
Microsoft® Windows® Update
35. Pia wants to verify that the system she is using is updated with the latest security patches.
Which of the following options will she use to check these settings?
A.
B.
C.
D.
Microsoft Outlook Express
Microsoft Office Outlook 2003
Microsoft Office
Microsoft Windows Update
36. You want to purchase DVDs from a Web site.
Which of the following options will you use to verify that the Web site is secure for online transactions?
A.
B.
C.
D.
Encryption tool
Automatic Updates icon
Locked padlock icon
Internet service provider (ISP) logo
37. Lina is unable to access the e-mail account that her Internet service provider (ISP) provides.
She realizes that someone has hacked into her account.
What action will she take to remedy this issue?
A.
B.
C.
D.
Protect her computer from surges and spikes
Use Windows Update
Install spyware
Report the incident to her ISP
Objective 3.3 Identify the guidelines to protect your children from online predators.
38. You want to educate your family about the signs of an online predator.
Which of the following signs will you share with your family?
A.
B.
C.
D.
Sends viruses
Tries to involve you in a relationship
Steals passwords
Sends junk e-mail messages
39. Naoki notices that his teenage children like to chat online.
Which of the following guidelines will Naoki recommend to ensure their safety from online
predators?
A.
B.
C.
D.
Chat only with people they know.
Use private chat areas.
Install multiple chat programs.
Chat with one person at a time.
40. Your children need to access the Internet frequently. Therefore, you install an Internet
connection on your computer.
Which of the following precautions will you take when your children access the Internet?
A.
B.
C.
D.
Regularly check the Web sites your children visit.
Block Web sites that offer free e-mail accounts.
Block all search engines.
Recommend use of chat rooms instead of e-mail.
41. Your niece uses the Internet frequently. You want to block some Web sites that are
inappropriate for her age group.
How will you block these Web sites?
A.
B.
C.
D.
Update the antivirus program.
Install spyware.
Use filter programs.
Check Windows Update.
42. Tamer's children use the Internet to chat with their friends. He wants to protect his children
from online predators.
Which of the following guidelines will you recommend?
A.
B.
C.
D.
Update the operating system
Deploy a firewall.
Block Web sites that offer free chat programs.
Set up a program that monitors online chat.
43. You see your friend chatting with an unknown user.
Which of the following guidelines will you recommend to ensure safety over chat?
A.
B.
C.
D.
Close the chat program.
Reply to users who seek your personal information.
Share personal information only with people you trust.
Use private chat areas.
44. Kitti receives an e-mail message from an unknown e-mail address offering discounts on
game CDs. As specified in the message, Kitti needs to share his name, age, and contact
information to receive the discount.
Which of the following actions does Kitti need to take?
A.
B.
C.
D.
Send his personal information to receive the discount.
Delete the e-mail message.
Use an spyware-fighting program.
Forward the e-mail message to friends.
Lesson 4: Keeping Your Computer Secure and Updated
Objective 4.1 Explain the purpose of different security settings on your computer.
45. Jim discovers that his son visits Web sites that are inappropriate for his age. Jim wants to
restrict access to these sites.
Which of the following security settings will help Jim to block these sites?
A.
B.
C.
D.
Microsoft® Windows® Firewall
Internet Options
Automatic Updates
Antivirus Options
46. Jack is annoyed with the pop-up messages that appear whenever he visits a Web site. He
wants to block all of the pop-up messages.
Which of the following security settings will help him to block all of the pop-up messages?
A.
B.
C.
D.
Automatic Updates
Windows Firewall
Antivirus Options
Internet Options
47. Martin wants to set Windows to automatically check for the latest security patches released
by Microsoft.
Which security settings will he use to check for the latest security patches at periodic intervals?
A.
B.
C.
D.
Internet Options
Windows Firewall
Automatic Updates
Antivirus Updates
48. Bill wants to understand the purpose of Windows Firewall.
Which of the following options states the purpose of Windows Firewall?
A. Installs security patches
B. Restricts unauthorized access
C. Blocks pop-up messages
D. Blocks Web sites
49. Jim wants to block a Web site.
Which of the following Internet Properties tabs will he use to do this?
A.
B.
C.
D.
Security
Content
Privacy
Connections
Lesson 5: Computer Ethics
Objective 5.1 Explain what the terms Intellectual Property and copyright mean as they apply
to computing.
50. While reading a novel, you realize that the author has copied material from another author.
How will you categorize this violation?
A.
B.
C.
D.
Phishing
Plagiarism
Libel
Slander
51. Monica recently heard about copyright. She wants to know what actions violate copyright.
Which one of the following actions is a copyright violation?
A.
B.
C.
D.
Sharing a Web site address
Reading material from a publicly available Web site
Copying software and distributing it to your friends
Quoting a paragraph and mentioning the source
52. For a project, Bill decides to use content from a Web site. However, he forgets to state the source.
What has Bill done?
A.
B.
C.
D.
Libel
Plagiarism
Gambling
Defamation
53. Ken decides to download the latest song from his favorite band from a publicly available
Web site and share it with his friends.
What is Ken doing?
A.
B.
C.
D.
Breaching copyright
Breaching security
Slandering the singer
Violating privacy
Objective 5.2 Identify the various legal concerns associated with information exchange.
54. Glenn notices that his colleague is making false statements about him in an online public
forum.
What is Glenn's colleague doing?
A.
B.
C.
D.
Plagiarism
Defamation
Gambling
Phishing