SlideShare a Scribd company logo
1 of 14
Microsoft Digital Literacy
                               Security and Privacy
                             Test Item File Answer Key


Lesson 1: An Overview of Computer Security and Privacy

Objective 1.1 Explain what the terms security and privacy mean as they apply to computing.


1. You accidentally delete a registry file. Now you cannot start your computer.

What kind of computer threat is this?

   A.   Spoofing
   B.   Phishing
   C.   Software piracy
   D.   Human error (Correct Answer)



2. Someone has tampered with your computer and erased data.

What kind of computer threat is this?

   A.   Physical theft
   B.   Security (Correct Answer)
   C.   Environmental
   D.   Spyware



3. You want a new stand-alone computer.

What will you do to prevent others from accessing your confidential data in this computer?

   A.   Use an uninterruptible power supply (UPS) and a surge protector.
   B.   Use a user name and password. (Correct Answer)
   C.   Back up data and save it in a different location.
   D.   Install a spyware program and an antivirus program.
4. Your computer does not work when it heats up.

What is affecting your computer in this case?

   A.   Hackers trying to access your computer
   B.   Firewall installed in your computer
   C.   Many programs opened simultaneously
   D.   Environment surrounding your computer (Correct Answer)



5. After a voltage fluctuation, your computer stops working.

What will you do to prevent this problem in the future?

   A.   Use a surge protector. (Correct Answer)
   B.   Install an antivirus program.
   C.   Use spyware.
   D.   Back up data.



6. Your friend is confused with the terms privacy and security. She comes to you with a list of
threats to computers.

Which of the following threats will you categorize as a threat to computer privacy?

   A.   Accidental erasure of data
   B.   Hardware failure
   C.   Damage to computer because of an earthquake
   D.   Theft of confidential data (Correct Answer)



7. There is a hurricane alert in your area.

Which one of the following actions will you take to protect the data in your computer?

   A.   Install a virus protection program.
   B.   Store the data in a safe location. (Correct Answer)
   C.   Install spyware-fighting software.
   D.   Install a firewall to prevent hacking.
8. Frequent power outages happen in your area.

How can you protect your computer from this when a power outage happens?

   A.   Use an uninterruptible power supply (UPS). (Correct Answer)
   B.   Use a firewall.
   C.   Use a surge protector.
   D.   Install an antivirus program.



9. You spilled coffee on your computer.

What kind of threat is this?

   A.   Human error (Correct Answer)
   B.   Natural disaster
   C.   Environmental threat
   D.   Hacking



10. You receive an e-mail message. The sender of the message claims to be a bank executive and
wants your personal information to open an account for you.

Which one of the following terms describes this activity?

   A.   Spoofing
   B.   Spying
   C.   Hacking
   D.   Phishing (Correct Answer)



11. You are unable to log on to your e-mail account. You realize that someone has changed the
password without your knowledge.

Which one of the following terms describes this activity?

   A.   Phishing
   B.   Spoofing (Correct Answer)
   C.   Spamming
   D.   Cracking
12. The system administrator informs you that a Trojan horse has infected your computer.

Which program did the system administrator use to determine this?

   A.   Microsoft® Windows® Firewall
   B.   Microsoft® Internet Explorer®
   C.   Antivirus (Correct Answer)
   D.   Uninterruptible power supply (UPS)



13. You cannot access a file in a computer that belongs to your friend.

What prevents you from accessing the file?

   A.   Spyware
   B.   Firewall (Correct Answer)
   C.   Antivirus
   D.   Uninterruptible power supply (UPS)



14. The network administrator informs you that Niraj is viewing inappropriate Web sites. A
program installed on Niraj's computer monitors his browsing activities without his knowledge.

What type of program is installed on Niraj's computer?

   A.   Antivirus
   B.   Microsoft Windows Update (Correct Answer)
   C.   Spyware
   D.   Firewall


Lesson 2: Protecting Your Computer and Your Data

Objective 2.1 Identify the various methods of protecting the operating system, software, and
data in your system.


15. Northwind Traders wants to grant network access only to specific employees.

Which of the following methods can help Northwind Traders restrict the use of the network?
A. Lock combination
B. Data encryption
C. Data backup.
D. User identification (Correct Answer)
16. You need to go to an urgent meeting. You do not want your colleagues to use your computer
in your absence.

Which of the following methods will you use to ensure that no one uses your computer while
you are away?

A.    Turn off the monitor.
B.    Use Lock Computer button. (Correct Answer)
C.    Use a firewall.
D.    Install updates for your computer.


17. Tulin sets a password for her computer. However, she suspects that someone is accessing
her computer in her absence.

Which of the following methods will help Tulin ensure that nobody accesses her computer
without her permission?

A. Use an spyware-fighting program.
B. Update the operating system.
C. Deploy a firewall.
D. Change the password frequently. (Correct Answer)


18. Your friend installs security patches on his computer.

Which of the following benefits will these security patches provide?

A.   Protecting the computer from malicious attacks (Correct Answer)
B.   Updating the antivirus program
C.   Creating periodic backups
D.   Preventing spam e-mail messages


Objective 2.2 Identify the various means of securing online and network transactions.

19. Robert works for Blue Yonder Airlines. Managers of his organization notice that some
employees use corporate applications for unethical purposes.

Which of the following tools can managers use to check this unethical practice?

A. Antivirus program
B. Spyware (Correct Answer)
C. Cookies
D. Firewall
20. Tony wants to purchase books from a Web site.

Which of the following will ensure that the Web site is secure for online transactions?

A.    Windows Firewall
B.    Secure Sockets Layer (SSL) (Correct Answer)
C.    Cookies
D.    Antivirus program


21. Your friend wants to know about Secure Sockets Layer (SSL).

What will you explain to him?

             A.                                                             A means of
            checking if a document on the Web is genuine
B.    A standard and a secure way of presenting information
C.    A means to validate the identity of the user who accesses a Web site
D.    A standard for encoding information that is sent over the Web (Correct Answer)


22. Syed visits his friend Karen. He uses her computer to perform multiple banking transactions
online. He wants to ensure that after he leaves, no one else can know which Web sites he visited.

Which of the following actions will he perform to ensure this? Select three.


A.   Enable active content
B.   Disable Windows Firewall
C.   Delete cookies (Correct Answer)
D.   Reset Web settings
E.   Clear browser cache (Correct Answer)
F.   Empty Recycle Bin
G.   Clear history (Correct Answer)



23. Apurva Dalia wants to set a password for his online banking account.

Which of the following passwords is a strong password?

A.   Password
B.   ABC
C.   ApurvaDalia
D.   ADalia#175 (Correct Answer)
24. Your friend wants to know about the methods for securing online and network transactions.

Which of the following methods will you suggest to her? Select two.


A. Check history files.
B. Disable Automatic Updates.
C. Enable Windows Firewall. (Correct Answer)
D. Use strong passwords. (Correct Answer)
E. Enable active content.


Objective 2.3 Identify the common measures for securing e-mail and instant messaging
transactions.

25. Viktor likes to exchange e-mail messages with his friends. Every day, he receives many
messages with attachments. Viktor wants to protect his computer from virus attacks by e-mail.

Which of the following guidelines will Viktor apply to protect his computer?

A.   Reply to spam e-mail messages
B.   Copy attachments to his computer before opening them.
C.   Avoid opening e-mail attachments from unknown users. (Correct Answer)
D.   Reinstall the e-mail client periodically.


26. Your friend uses instant messaging to chat with friends. He wants to ensure that his instant
messaging transactions are secure.

Which of the following guidelines will you suggest?

A.   Chat with only one user at a time.
B.   Use different programs to chat with different users
C.   Open attachments received over chat.
D.   Chat with known users. (Correct Answer)


27. You receive an e-mail message from an unknown user. This message includes an .exe file as
an attachment.

What will you do with this message?

A.   Install the .exe file.
B.   Save the attachment on your computer.
C.   Delete the message. (Correct Answer)
D. Move the message to another folder.
28. Manish wants to know about some common guidelines for securing e-mail transactions.

Which of the following guidelines will you suggest to him?

A.   Archive e-mail messages that include attachments.
B.   Save junk e-mail messages in a separate folder.
C.   Reply to spam e-mail messages.
D.   Delete e-mail messages that include attachments from unknown users. (Correct Answer)


29. Milena receives several e-mail messages in a day. Her mailbox holds messages from her
bank, Internet service provider (ISP), and friends. She also has unsolicited messages about
products and discounts.

Which of the following messages in Milena's mailbox is a spam message?

A.   Account details from her bank
B.   E-mail account details from her ISP
C.   Commercial information from an unknown sender(Correct Answer)
D.   A message from a friend that includes family pictures

Lesson 3: Protecting Identify the common measures used to protect privacy.

Objective 3.1 Identify the common measures used to protect privacy.

30. Your friend wants to ensure that his project data is secure and can be restored in case of an
environmental disaster.

Which of the following measures will you suggest to him?

A.    Maintain a backup in a secure location. (Correct Answer)
B.    Update the antivirus program.
C.    Use Microsoft® Windows® Update.
D.    Install an spyware-fighting program.


31. You receive an e-mail message from an unknown e-mail address. The message requests you
to share your credit card details to receive a discount on some music CDs.

What will you do with this message?

A.    Reply to the message to provide your credit card details.
B.    Encrypt the message.
C.    Scan the message for viruses.
D.    Delete the message. (Correct Answer)
32. Karim wants to send confidential information over e-mail to his colleague.

Which of the following measures will he apply to ensure the privacy of the e-mail message?

A.   Use an spyware-fighting program.
B.   Encrypt the e-mail message. (Correct Answer)
C.   Use e-mail filters.
D.   Maintain a backup of the e-mail message.


33. Gloria uses the Internet frequently for online purchasing. To protect her system from virus
attacks, she installs an antivirus program. However, within a few days, she gets a virus alert on
her system.

Which of the following measures will she implement to prevent this virus in the future?

A.    Update and run virus scans daily. (Correct Answer)
B.    Update the Internet browser.
C.    Check Windows Update.
D.    Use a strong password.


34. You want to encrypt a confidential e-mail message before you send it to your colleague.

Which of the following programs will you use to encrypt the message?

A.   Firewall
B.   Spyware
C.   Microsoft® Office Outlook®2003 (Correct Answer)
D.   Microsoft® Windows® Update


35. Pia wants to verify that the system she is using is updated with the latest security patches.

Which of the following options will she use to check these settings?

A.    Microsoft Outlook Express
B.    Microsoft Office Outlook 2003
C.    Microsoft Office
D.    Microsoft Windows Update (Correct Answer)
36. You want to purchase DVDs from a Web site.

Which of the following options will you use to verify that the Web site is secure for online
transactions?

A.    Encryption tool
B.    Automatic Updates icon
C.    Locked padlock icon (Correct Answer)
D.    Internet service provider (ISP) logo


37. Lina is unable to access the e-mail account that her Internet service provider (ISP) provides.
She realizes that someone has hacked into her account.

What action will she take to remedy this issue?

A.    Protect her computer from surges and spikes
B.    Use Microsoft® Windows® Update
C.    Install spyware
D.    Report the incident to her ISP (Correct Answer)


Objective 3.3 Identify the guidelines to protect your children from online predators.

38. You want to educate your family about the signs of an online predator.

Which of the following signs will you share with your family?

A.    Sends viruses
B.    Tries to involve you in a relationship (Correct Answer)
C.    Steals passwords
D.    Sends junk e-mail messages


39. Naoki notices that his teenage children like to chat online.

Which of the following guidelines will Naoki recommend to ensure their safety from online
predators?

A.    Chat only with people they know. (Correct Answer)
B.    Use private chat areas.
C.    Install multiple chat programs.
D.    Chat with one person at a time.
40. Your children need to access the Internet frequently. Therefore, you install an Internet
connection on your computer.

Which of the following precautions will you take when your children access the Internet?

A.    Regularly check the Web sites your children visit. (Correct Answer)
B.    Block Web sites that offer free e-mail accounts.
C.    Block all search engines.
D.    Recommend use of chat rooms instead of e-mail.


41. Your niece uses the Internet frequently. You want to block some Web sites that are
inappropriate for her age group.

How will you block these Web sites?

A.    Update the antivirus program.
B.    Install spyware.
C.    Use filter programs. (Correct Answer)
D.    Check Windows Update.


42. Tamer's children use the Internet to chat with their friends. He wants to protect his children
from online predators.

Which of the following guidelines will you recommend?

A.    Update the operating system
B.    Deploy a firewall.
C.    Block Web sites that offer free chat programs.
D.    Set up a program that monitors online chat. (Correct Answer)


43. You see your friend chatting with an unknown user.

Which of the following guidelines will you recommend to ensure safety over chat?

A.    Close the chat program.
B.    Reply to users who seek your personal information.
C.    Share personal information only with people you trust. (Correct Answer)
D.    Use private chat areas.
44. Kitti receives an e-mail message from an unknown e-mail address offering discounts on
game CDs. As specified in the message, Kitti needs to share his name, age, and contact
information to receive the discount.

Which of the following actions does Kitti need to take?

A.     Send his personal information to receive the discount.
B.     Delete the e-mail message. (Correct Answer)
C.     Use an spyware-fighting program.
D.     Forward the e-mail message to friends.


Lesson 4: Keeping Your Computer Secure and Updated

Objective 4.1 Explain the purpose of different security settings on your computer.

45. Jim discovers that his son visits Web sites that are inappropriate for his age. Jim wants to
restrict access to these sites.

Which of the following security settings will help Jim to block these sites?

A.   Windows Firewall
B.   Internet Options (Correct Answer)
C.   Automatic Updates
D.   Antivirus Options

46. Jack is annoyed with the pop-up messages that appear whenever he visits a Web site. He
wants to block all of the pop-up messages.

Which of the following security settings will help him to block all of the pop-up messages?

A.   Automatic Updates
B.   Windows Firewall
C.   Antivirus Options (Correct Answer)
D.   Internet Options


47. Martin wants to set Windows to automatically check for the latest security patches released
by Microsoft.

Which security settings will he use to check for the latest security patches at periodic intervals?

A.    Internet Options
B.    Windows Firewall
C.    Automatic Updates (Correct Answer)
D.    Antivirus Updates
48. Bill wants to understand the purpose of Windows Firewall.

Which of the following options states the purpose of Windows Firewall?

A. Installs security patches
B. Restricts unauthorized access (Correct Answer)
C. Blocks pop-up messages
D. Blocks Web sites


49. Jim wants to block a Web site.

Which of the following Internet Properties tabs will he use to do this?

A.    Security (Correct Answer)
B.    Content
C.    Privacy
D.    Connections

Lesson 5: Computer Ethics

Objective 5.1 Explain what the terms Intellectual Property and copyright mean as they apply
to computing.

50. While reading a novel, you realize that the author has copied material from another author.

How will you categorize this violation?

A.    Phishing
B.    Plagiarism (Correct Answer)
C.    Libel
D.    Slander


51. Monica recently heard about copyright. She wants to know what actions violate copyright.

Which one of the following actions is a copyright violation?

A.   Sharing a Web site address
B.   Reading material from a publicly available Web site
C.   Copying software and distributing it to your friends (Correct Answer)
D.   Quoting a paragraph and mentioning the source
52. For a project, Bill decides to use content from a Web site. However, he forgets to state the
source.

What has Bill done?

A.    Libel
B.    Plagiarism (Correct Answer)
C.    Gambling
D.    Defamation


53. Ken decides to download the latest song from his favorite band from a publicly available
Web site and share it with his friends.

What is Ken doing?

A.   Breaching copyright (Correct Answer)
B.   Breaching security
C.   Slandering the singer
D.   Violating privacy



Objective 5.2 Identify the various legal concerns associated with information exchange.

54. Glenn notices that his colleague is making false statements about him in an online public
forum.

What is Glenn's colleague doing?

A.   Plagiarism
B.   Defamation (Correct Answer)
C.   Gambling
D.   Phishing

More Related Content

What's hot

How To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and ForensicsHow To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and ForensicsLondon School of Cyber Security
 
Sample paper-po-computer-awareness-2010-www.bankpoclerk.com
Sample paper-po-computer-awareness-2010-www.bankpoclerk.comSample paper-po-computer-awareness-2010-www.bankpoclerk.com
Sample paper-po-computer-awareness-2010-www.bankpoclerk.comVirendra Kumar Dubey
 
finalreport1182014
finalreport1182014finalreport1182014
finalreport1182014chanhduy
 
Enemies of the west
Enemies of the westEnemies of the west
Enemies of the westNeil Lines
 
How to protect your computer from viruses.
How to protect your computer from viruses.How to protect your computer from viruses.
How to protect your computer from viruses.Acageron
 
How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHabFg
 
Viruses, Spyware, and Internet Security
Viruses, Spyware, and Internet SecurityViruses, Spyware, and Internet Security
Viruses, Spyware, and Internet Securityinternetsecurity201002
 
14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses14 household ways to protect your computer from viruses
14 household ways to protect your computer from virusesar-rifke.com
 
Thane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationThane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationJeff Zahn
 

What's hot (14)

Iu report
Iu reportIu report
Iu report
 
How To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and ForensicsHow To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and Forensics
 
Sample paper-po-computer-awareness-2010-www.bankpoclerk.com
Sample paper-po-computer-awareness-2010-www.bankpoclerk.comSample paper-po-computer-awareness-2010-www.bankpoclerk.com
Sample paper-po-computer-awareness-2010-www.bankpoclerk.com
 
Bulletproof IT Security
Bulletproof IT SecurityBulletproof IT Security
Bulletproof IT Security
 
finalreport1182014
finalreport1182014finalreport1182014
finalreport1182014
 
Enemies of the west
Enemies of the westEnemies of the west
Enemies of the west
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
How To Protect Your Website From Bot Attacks
How To Protect Your Website From Bot AttacksHow To Protect Your Website From Bot Attacks
How To Protect Your Website From Bot Attacks
 
Advanced Threat Detection in ICS – SCADA Environments
Advanced Threat Detection in ICS – SCADA EnvironmentsAdvanced Threat Detection in ICS – SCADA Environments
Advanced Threat Detection in ICS – SCADA Environments
 
How to protect your computer from viruses.
How to protect your computer from viruses.How to protect your computer from viruses.
How to protect your computer from viruses.
 
How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, Virus
 
Viruses, Spyware, and Internet Security
Viruses, Spyware, and Internet SecurityViruses, Spyware, and Internet Security
Viruses, Spyware, and Internet Security
 
14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses
 
Thane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationThane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentation
 

Viewers also liked

Searching teacherdemo beginner
Searching teacherdemo beginnerSearching teacherdemo beginner
Searching teacherdemo beginnerthinkict
 
Digital Story Telling
Digital Story TellingDigital Story Telling
Digital Story Tellingthinkict
 
Module 10 educational software
Module 10 educational softwareModule 10 educational software
Module 10 educational softwarethinkict
 
Open Office Writer : Level1
Open Office Writer : Level1 Open Office Writer : Level1
Open Office Writer : Level1 thinkict
 
Marking Grid_Web Communications
Marking Grid_Web CommunicationsMarking Grid_Web Communications
Marking Grid_Web Communicationsthinkict
 
Photostory
PhotostoryPhotostory
Photostorythinkict
 
Open Office Calc : Lesson 05
Open Office Calc : Lesson 05Open Office Calc : Lesson 05
Open Office Calc : Lesson 05thinkict
 

Viewers also liked (8)

Podcast
PodcastPodcast
Podcast
 
Searching teacherdemo beginner
Searching teacherdemo beginnerSearching teacherdemo beginner
Searching teacherdemo beginner
 
Digital Story Telling
Digital Story TellingDigital Story Telling
Digital Story Telling
 
Module 10 educational software
Module 10 educational softwareModule 10 educational software
Module 10 educational software
 
Open Office Writer : Level1
Open Office Writer : Level1 Open Office Writer : Level1
Open Office Writer : Level1
 
Marking Grid_Web Communications
Marking Grid_Web CommunicationsMarking Grid_Web Communications
Marking Grid_Web Communications
 
Photostory
PhotostoryPhotostory
Photostory
 
Open Office Calc : Lesson 05
Open Office Calc : Lesson 05Open Office Calc : Lesson 05
Open Office Calc : Lesson 05
 

Similar to Computer security and_privacy_tif_key

Modul 1-sample-test
Modul 1-sample-testModul 1-sample-test
Modul 1-sample-teststacio
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptxssuser2209e8
 
020-100 Certification Exam Unlock Success Dumps pdf.pdf
020-100 Certification Exam Unlock Success Dumps pdf.pdf020-100 Certification Exam Unlock Success Dumps pdf.pdf
020-100 Certification Exam Unlock Success Dumps pdf.pdfAliza Oscar
 
A day that will be remembered
A day that will be rememberedA day that will be remembered
A day that will be rememberedwolverine0614
 
La1 information and communication technology and society
La1   information and communication technology and societyLa1   information and communication technology and society
La1 information and communication technology and societyAzmiah Mahmud
 
Learning area 1_-_information_and_communication_technology_and_society
Learning area 1_-_information_and_communication_technology_and_societyLearning area 1_-_information_and_communication_technology_and_society
Learning area 1_-_information_and_communication_technology_and_societySaktis Kesavan
 
Learning area 1 information and communication technology and society
Learning area 1   information and communication technology and societyLearning area 1   information and communication technology and society
Learning area 1 information and communication technology and societyShuren Lew
 
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdfSECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdfJohnRicos
 
A software designer has realized that a soon-to-be released vers
A software designer has realized that a soon-to-be released versA software designer has realized that a soon-to-be released vers
A software designer has realized that a soon-to-be released verslatashiadegale
 
Regional Diagnostic Test ICT-CSS-10.pptx
Regional Diagnostic Test ICT-CSS-10.pptxRegional Diagnostic Test ICT-CSS-10.pptx
Regional Diagnostic Test ICT-CSS-10.pptxMarkJosephFrancisco3
 
ICT security questionaire
ICT security questionaireICT security questionaire
ICT security questionaireSMK NARINANG
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.pptAsif Raza
 
mcq edu03 Anju 23.pdf
mcq edu03 Anju 23.pdfmcq edu03 Anju 23.pdf
mcq edu03 Anju 23.pdfANJUMOHANANU
 
Test EEP IT question.docx
Test EEP IT question.docxTest EEP IT question.docx
Test EEP IT question.docxBinyamDeresse
 
Laudon traver ec11-tif_ch05
Laudon traver ec11-tif_ch05Laudon traver ec11-tif_ch05
Laudon traver ec11-tif_ch05BookStoreLib
 
Cyber Safety Class 4 Computers Worksheet.pdf
Cyber Safety Class 4 Computers Worksheet.pdfCyber Safety Class 4 Computers Worksheet.pdf
Cyber Safety Class 4 Computers Worksheet.pdfTakshila Learning
 

Similar to Computer security and_privacy_tif_key (20)

Modul 1-sample-test
Modul 1-sample-testModul 1-sample-test
Modul 1-sample-test
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
 
020-100 Certification Exam Unlock Success Dumps pdf.pdf
020-100 Certification Exam Unlock Success Dumps pdf.pdf020-100 Certification Exam Unlock Success Dumps pdf.pdf
020-100 Certification Exam Unlock Success Dumps pdf.pdf
 
A day that will be remembered
A day that will be rememberedA day that will be remembered
A day that will be remembered
 
Soalan ictl bi
Soalan ictl biSoalan ictl bi
Soalan ictl bi
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
La1 information and communication technology and society
La1   information and communication technology and societyLa1   information and communication technology and society
La1 information and communication technology and society
 
Learning area 1_-_information_and_communication_technology_and_society
Learning area 1_-_information_and_communication_technology_and_societyLearning area 1_-_information_and_communication_technology_and_society
Learning area 1_-_information_and_communication_technology_and_society
 
Learning area 1 information and communication technology and society
Learning area 1   information and communication technology and societyLearning area 1   information and communication technology and society
Learning area 1 information and communication technology and society
 
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdfSECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
 
Wa
WaWa
Wa
 
A software designer has realized that a soon-to-be released vers
A software designer has realized that a soon-to-be released versA software designer has realized that a soon-to-be released vers
A software designer has realized that a soon-to-be released vers
 
Regional Diagnostic Test ICT-CSS-10.pptx
Regional Diagnostic Test ICT-CSS-10.pptxRegional Diagnostic Test ICT-CSS-10.pptx
Regional Diagnostic Test ICT-CSS-10.pptx
 
ICT security questionaire
ICT security questionaireICT security questionaire
ICT security questionaire
 
shubhangi.pptx
shubhangi.pptxshubhangi.pptx
shubhangi.pptx
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
mcq edu03 Anju 23.pdf
mcq edu03 Anju 23.pdfmcq edu03 Anju 23.pdf
mcq edu03 Anju 23.pdf
 
Test EEP IT question.docx
Test EEP IT question.docxTest EEP IT question.docx
Test EEP IT question.docx
 
Laudon traver ec11-tif_ch05
Laudon traver ec11-tif_ch05Laudon traver ec11-tif_ch05
Laudon traver ec11-tif_ch05
 
Cyber Safety Class 4 Computers Worksheet.pdf
Cyber Safety Class 4 Computers Worksheet.pdfCyber Safety Class 4 Computers Worksheet.pdf
Cyber Safety Class 4 Computers Worksheet.pdf
 

More from thinkict

Open Office Impress : Lesson 08
Open Office Impress : Lesson 08Open Office Impress : Lesson 08
Open Office Impress : Lesson 08thinkict
 
Open Office Calc : Level1
 Open Office Calc : Level1 Open Office Calc : Level1
Open Office Calc : Level1thinkict
 
Open Office Calc : Lesson 07
Open Office Calc : Lesson 07Open Office Calc : Lesson 07
Open Office Calc : Lesson 07thinkict
 
Open Office Calc : Level 1
Open Office Calc : Level 1Open Office Calc : Level 1
Open Office Calc : Level 1thinkict
 
Open Office Calc : Lesson 06
Open Office Calc : Lesson 06Open Office Calc : Lesson 06
Open Office Calc : Lesson 06thinkict
 
Text Writer
Text WriterText Writer
Text Writerthinkict
 
Open Office Writer : Level2
Open Office Writer : Level2 Open Office Writer : Level2
Open Office Writer : Level2 thinkict
 
Open Office Writer : Lesson 03
Open Office Writer : Lesson 03Open Office Writer : Lesson 03
Open Office Writer : Lesson 03thinkict
 
Open office Writer : Lesson 02
Open office Writer : Lesson 02Open office Writer : Lesson 02
Open office Writer : Lesson 02thinkict
 
Marking Grid_Computer Operations
Marking Grid_Computer OperationsMarking Grid_Computer Operations
Marking Grid_Computer Operationsthinkict
 
Marking Grid_AlphaTech
Marking Grid_AlphaTechMarking Grid_AlphaTech
Marking Grid_AlphaTechthinkict
 
Web Communications Brochure
Web Communications BrochureWeb Communications Brochure
Web Communications Brochurethinkict
 
Internet Operations Brochure
Internet Operations BrochureInternet Operations Brochure
Internet Operations Brochurethinkict
 
Computer Operations Brochure
Computer Operations BrochureComputer Operations Brochure
Computer Operations Brochurethinkict
 
AlphaTech Brochure
AlphaTech BrochureAlphaTech Brochure
AlphaTech Brochurethinkict
 
Internet Operations
Internet OperationsInternet Operations
Internet Operationsthinkict
 
Computer Operations
Computer OperationsComputer Operations
Computer Operationsthinkict
 
Alphatech 2011-12
Alphatech 2011-12Alphatech 2011-12
Alphatech 2011-12thinkict
 
Plagiarism teacher demo_intermediate
Plagiarism teacher demo_intermediatePlagiarism teacher demo_intermediate
Plagiarism teacher demo_intermediatethinkict
 
Action Plan _ Digital Story Telling
Action Plan _ Digital Story TellingAction Plan _ Digital Story Telling
Action Plan _ Digital Story Tellingthinkict
 

More from thinkict (20)

Open Office Impress : Lesson 08
Open Office Impress : Lesson 08Open Office Impress : Lesson 08
Open Office Impress : Lesson 08
 
Open Office Calc : Level1
 Open Office Calc : Level1 Open Office Calc : Level1
Open Office Calc : Level1
 
Open Office Calc : Lesson 07
Open Office Calc : Lesson 07Open Office Calc : Lesson 07
Open Office Calc : Lesson 07
 
Open Office Calc : Level 1
Open Office Calc : Level 1Open Office Calc : Level 1
Open Office Calc : Level 1
 
Open Office Calc : Lesson 06
Open Office Calc : Lesson 06Open Office Calc : Lesson 06
Open Office Calc : Lesson 06
 
Text Writer
Text WriterText Writer
Text Writer
 
Open Office Writer : Level2
Open Office Writer : Level2 Open Office Writer : Level2
Open Office Writer : Level2
 
Open Office Writer : Lesson 03
Open Office Writer : Lesson 03Open Office Writer : Lesson 03
Open Office Writer : Lesson 03
 
Open office Writer : Lesson 02
Open office Writer : Lesson 02Open office Writer : Lesson 02
Open office Writer : Lesson 02
 
Marking Grid_Computer Operations
Marking Grid_Computer OperationsMarking Grid_Computer Operations
Marking Grid_Computer Operations
 
Marking Grid_AlphaTech
Marking Grid_AlphaTechMarking Grid_AlphaTech
Marking Grid_AlphaTech
 
Web Communications Brochure
Web Communications BrochureWeb Communications Brochure
Web Communications Brochure
 
Internet Operations Brochure
Internet Operations BrochureInternet Operations Brochure
Internet Operations Brochure
 
Computer Operations Brochure
Computer Operations BrochureComputer Operations Brochure
Computer Operations Brochure
 
AlphaTech Brochure
AlphaTech BrochureAlphaTech Brochure
AlphaTech Brochure
 
Internet Operations
Internet OperationsInternet Operations
Internet Operations
 
Computer Operations
Computer OperationsComputer Operations
Computer Operations
 
Alphatech 2011-12
Alphatech 2011-12Alphatech 2011-12
Alphatech 2011-12
 
Plagiarism teacher demo_intermediate
Plagiarism teacher demo_intermediatePlagiarism teacher demo_intermediate
Plagiarism teacher demo_intermediate
 
Action Plan _ Digital Story Telling
Action Plan _ Digital Story TellingAction Plan _ Digital Story Telling
Action Plan _ Digital Story Telling
 

Recently uploaded

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 

Recently uploaded (20)

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 

Computer security and_privacy_tif_key

  • 1. Microsoft Digital Literacy Security and Privacy Test Item File Answer Key Lesson 1: An Overview of Computer Security and Privacy Objective 1.1 Explain what the terms security and privacy mean as they apply to computing. 1. You accidentally delete a registry file. Now you cannot start your computer. What kind of computer threat is this? A. Spoofing B. Phishing C. Software piracy D. Human error (Correct Answer) 2. Someone has tampered with your computer and erased data. What kind of computer threat is this? A. Physical theft B. Security (Correct Answer) C. Environmental D. Spyware 3. You want a new stand-alone computer. What will you do to prevent others from accessing your confidential data in this computer? A. Use an uninterruptible power supply (UPS) and a surge protector. B. Use a user name and password. (Correct Answer) C. Back up data and save it in a different location. D. Install a spyware program and an antivirus program.
  • 2. 4. Your computer does not work when it heats up. What is affecting your computer in this case? A. Hackers trying to access your computer B. Firewall installed in your computer C. Many programs opened simultaneously D. Environment surrounding your computer (Correct Answer) 5. After a voltage fluctuation, your computer stops working. What will you do to prevent this problem in the future? A. Use a surge protector. (Correct Answer) B. Install an antivirus program. C. Use spyware. D. Back up data. 6. Your friend is confused with the terms privacy and security. She comes to you with a list of threats to computers. Which of the following threats will you categorize as a threat to computer privacy? A. Accidental erasure of data B. Hardware failure C. Damage to computer because of an earthquake D. Theft of confidential data (Correct Answer) 7. There is a hurricane alert in your area. Which one of the following actions will you take to protect the data in your computer? A. Install a virus protection program. B. Store the data in a safe location. (Correct Answer) C. Install spyware-fighting software. D. Install a firewall to prevent hacking.
  • 3. 8. Frequent power outages happen in your area. How can you protect your computer from this when a power outage happens? A. Use an uninterruptible power supply (UPS). (Correct Answer) B. Use a firewall. C. Use a surge protector. D. Install an antivirus program. 9. You spilled coffee on your computer. What kind of threat is this? A. Human error (Correct Answer) B. Natural disaster C. Environmental threat D. Hacking 10. You receive an e-mail message. The sender of the message claims to be a bank executive and wants your personal information to open an account for you. Which one of the following terms describes this activity? A. Spoofing B. Spying C. Hacking D. Phishing (Correct Answer) 11. You are unable to log on to your e-mail account. You realize that someone has changed the password without your knowledge. Which one of the following terms describes this activity? A. Phishing B. Spoofing (Correct Answer) C. Spamming D. Cracking
  • 4. 12. The system administrator informs you that a Trojan horse has infected your computer. Which program did the system administrator use to determine this? A. Microsoft® Windows® Firewall B. Microsoft® Internet Explorer® C. Antivirus (Correct Answer) D. Uninterruptible power supply (UPS) 13. You cannot access a file in a computer that belongs to your friend. What prevents you from accessing the file? A. Spyware B. Firewall (Correct Answer) C. Antivirus D. Uninterruptible power supply (UPS) 14. The network administrator informs you that Niraj is viewing inappropriate Web sites. A program installed on Niraj's computer monitors his browsing activities without his knowledge. What type of program is installed on Niraj's computer? A. Antivirus B. Microsoft Windows Update (Correct Answer) C. Spyware D. Firewall Lesson 2: Protecting Your Computer and Your Data Objective 2.1 Identify the various methods of protecting the operating system, software, and data in your system. 15. Northwind Traders wants to grant network access only to specific employees. Which of the following methods can help Northwind Traders restrict the use of the network? A. Lock combination B. Data encryption C. Data backup. D. User identification (Correct Answer)
  • 5. 16. You need to go to an urgent meeting. You do not want your colleagues to use your computer in your absence. Which of the following methods will you use to ensure that no one uses your computer while you are away? A. Turn off the monitor. B. Use Lock Computer button. (Correct Answer) C. Use a firewall. D. Install updates for your computer. 17. Tulin sets a password for her computer. However, she suspects that someone is accessing her computer in her absence. Which of the following methods will help Tulin ensure that nobody accesses her computer without her permission? A. Use an spyware-fighting program. B. Update the operating system. C. Deploy a firewall. D. Change the password frequently. (Correct Answer) 18. Your friend installs security patches on his computer. Which of the following benefits will these security patches provide? A. Protecting the computer from malicious attacks (Correct Answer) B. Updating the antivirus program C. Creating periodic backups D. Preventing spam e-mail messages Objective 2.2 Identify the various means of securing online and network transactions. 19. Robert works for Blue Yonder Airlines. Managers of his organization notice that some employees use corporate applications for unethical purposes. Which of the following tools can managers use to check this unethical practice? A. Antivirus program B. Spyware (Correct Answer) C. Cookies D. Firewall
  • 6. 20. Tony wants to purchase books from a Web site. Which of the following will ensure that the Web site is secure for online transactions? A. Windows Firewall B. Secure Sockets Layer (SSL) (Correct Answer) C. Cookies D. Antivirus program 21. Your friend wants to know about Secure Sockets Layer (SSL). What will you explain to him? A. A means of checking if a document on the Web is genuine B. A standard and a secure way of presenting information C. A means to validate the identity of the user who accesses a Web site D. A standard for encoding information that is sent over the Web (Correct Answer) 22. Syed visits his friend Karen. He uses her computer to perform multiple banking transactions online. He wants to ensure that after he leaves, no one else can know which Web sites he visited. Which of the following actions will he perform to ensure this? Select three. A. Enable active content B. Disable Windows Firewall C. Delete cookies (Correct Answer) D. Reset Web settings E. Clear browser cache (Correct Answer) F. Empty Recycle Bin G. Clear history (Correct Answer) 23. Apurva Dalia wants to set a password for his online banking account. Which of the following passwords is a strong password? A. Password B. ABC C. ApurvaDalia D. ADalia#175 (Correct Answer)
  • 7. 24. Your friend wants to know about the methods for securing online and network transactions. Which of the following methods will you suggest to her? Select two. A. Check history files. B. Disable Automatic Updates. C. Enable Windows Firewall. (Correct Answer) D. Use strong passwords. (Correct Answer) E. Enable active content. Objective 2.3 Identify the common measures for securing e-mail and instant messaging transactions. 25. Viktor likes to exchange e-mail messages with his friends. Every day, he receives many messages with attachments. Viktor wants to protect his computer from virus attacks by e-mail. Which of the following guidelines will Viktor apply to protect his computer? A. Reply to spam e-mail messages B. Copy attachments to his computer before opening them. C. Avoid opening e-mail attachments from unknown users. (Correct Answer) D. Reinstall the e-mail client periodically. 26. Your friend uses instant messaging to chat with friends. He wants to ensure that his instant messaging transactions are secure. Which of the following guidelines will you suggest? A. Chat with only one user at a time. B. Use different programs to chat with different users C. Open attachments received over chat. D. Chat with known users. (Correct Answer) 27. You receive an e-mail message from an unknown user. This message includes an .exe file as an attachment. What will you do with this message? A. Install the .exe file. B. Save the attachment on your computer. C. Delete the message. (Correct Answer)
  • 8. D. Move the message to another folder. 28. Manish wants to know about some common guidelines for securing e-mail transactions. Which of the following guidelines will you suggest to him? A. Archive e-mail messages that include attachments. B. Save junk e-mail messages in a separate folder. C. Reply to spam e-mail messages. D. Delete e-mail messages that include attachments from unknown users. (Correct Answer) 29. Milena receives several e-mail messages in a day. Her mailbox holds messages from her bank, Internet service provider (ISP), and friends. She also has unsolicited messages about products and discounts. Which of the following messages in Milena's mailbox is a spam message? A. Account details from her bank B. E-mail account details from her ISP C. Commercial information from an unknown sender(Correct Answer) D. A message from a friend that includes family pictures Lesson 3: Protecting Identify the common measures used to protect privacy. Objective 3.1 Identify the common measures used to protect privacy. 30. Your friend wants to ensure that his project data is secure and can be restored in case of an environmental disaster. Which of the following measures will you suggest to him? A. Maintain a backup in a secure location. (Correct Answer) B. Update the antivirus program. C. Use Microsoft® Windows® Update. D. Install an spyware-fighting program. 31. You receive an e-mail message from an unknown e-mail address. The message requests you to share your credit card details to receive a discount on some music CDs. What will you do with this message? A. Reply to the message to provide your credit card details. B. Encrypt the message. C. Scan the message for viruses. D. Delete the message. (Correct Answer)
  • 9. 32. Karim wants to send confidential information over e-mail to his colleague. Which of the following measures will he apply to ensure the privacy of the e-mail message? A. Use an spyware-fighting program. B. Encrypt the e-mail message. (Correct Answer) C. Use e-mail filters. D. Maintain a backup of the e-mail message. 33. Gloria uses the Internet frequently for online purchasing. To protect her system from virus attacks, she installs an antivirus program. However, within a few days, she gets a virus alert on her system. Which of the following measures will she implement to prevent this virus in the future? A. Update and run virus scans daily. (Correct Answer) B. Update the Internet browser. C. Check Windows Update. D. Use a strong password. 34. You want to encrypt a confidential e-mail message before you send it to your colleague. Which of the following programs will you use to encrypt the message? A. Firewall B. Spyware C. Microsoft® Office Outlook®2003 (Correct Answer) D. Microsoft® Windows® Update 35. Pia wants to verify that the system she is using is updated with the latest security patches. Which of the following options will she use to check these settings? A. Microsoft Outlook Express B. Microsoft Office Outlook 2003 C. Microsoft Office D. Microsoft Windows Update (Correct Answer)
  • 10. 36. You want to purchase DVDs from a Web site. Which of the following options will you use to verify that the Web site is secure for online transactions? A. Encryption tool B. Automatic Updates icon C. Locked padlock icon (Correct Answer) D. Internet service provider (ISP) logo 37. Lina is unable to access the e-mail account that her Internet service provider (ISP) provides. She realizes that someone has hacked into her account. What action will she take to remedy this issue? A. Protect her computer from surges and spikes B. Use Microsoft® Windows® Update C. Install spyware D. Report the incident to her ISP (Correct Answer) Objective 3.3 Identify the guidelines to protect your children from online predators. 38. You want to educate your family about the signs of an online predator. Which of the following signs will you share with your family? A. Sends viruses B. Tries to involve you in a relationship (Correct Answer) C. Steals passwords D. Sends junk e-mail messages 39. Naoki notices that his teenage children like to chat online. Which of the following guidelines will Naoki recommend to ensure their safety from online predators? A. Chat only with people they know. (Correct Answer) B. Use private chat areas. C. Install multiple chat programs. D. Chat with one person at a time.
  • 11. 40. Your children need to access the Internet frequently. Therefore, you install an Internet connection on your computer. Which of the following precautions will you take when your children access the Internet? A. Regularly check the Web sites your children visit. (Correct Answer) B. Block Web sites that offer free e-mail accounts. C. Block all search engines. D. Recommend use of chat rooms instead of e-mail. 41. Your niece uses the Internet frequently. You want to block some Web sites that are inappropriate for her age group. How will you block these Web sites? A. Update the antivirus program. B. Install spyware. C. Use filter programs. (Correct Answer) D. Check Windows Update. 42. Tamer's children use the Internet to chat with their friends. He wants to protect his children from online predators. Which of the following guidelines will you recommend? A. Update the operating system B. Deploy a firewall. C. Block Web sites that offer free chat programs. D. Set up a program that monitors online chat. (Correct Answer) 43. You see your friend chatting with an unknown user. Which of the following guidelines will you recommend to ensure safety over chat? A. Close the chat program. B. Reply to users who seek your personal information. C. Share personal information only with people you trust. (Correct Answer) D. Use private chat areas.
  • 12. 44. Kitti receives an e-mail message from an unknown e-mail address offering discounts on game CDs. As specified in the message, Kitti needs to share his name, age, and contact information to receive the discount. Which of the following actions does Kitti need to take? A. Send his personal information to receive the discount. B. Delete the e-mail message. (Correct Answer) C. Use an spyware-fighting program. D. Forward the e-mail message to friends. Lesson 4: Keeping Your Computer Secure and Updated Objective 4.1 Explain the purpose of different security settings on your computer. 45. Jim discovers that his son visits Web sites that are inappropriate for his age. Jim wants to restrict access to these sites. Which of the following security settings will help Jim to block these sites? A. Windows Firewall B. Internet Options (Correct Answer) C. Automatic Updates D. Antivirus Options 46. Jack is annoyed with the pop-up messages that appear whenever he visits a Web site. He wants to block all of the pop-up messages. Which of the following security settings will help him to block all of the pop-up messages? A. Automatic Updates B. Windows Firewall C. Antivirus Options (Correct Answer) D. Internet Options 47. Martin wants to set Windows to automatically check for the latest security patches released by Microsoft. Which security settings will he use to check for the latest security patches at periodic intervals? A. Internet Options B. Windows Firewall C. Automatic Updates (Correct Answer) D. Antivirus Updates
  • 13. 48. Bill wants to understand the purpose of Windows Firewall. Which of the following options states the purpose of Windows Firewall? A. Installs security patches B. Restricts unauthorized access (Correct Answer) C. Blocks pop-up messages D. Blocks Web sites 49. Jim wants to block a Web site. Which of the following Internet Properties tabs will he use to do this? A. Security (Correct Answer) B. Content C. Privacy D. Connections Lesson 5: Computer Ethics Objective 5.1 Explain what the terms Intellectual Property and copyright mean as they apply to computing. 50. While reading a novel, you realize that the author has copied material from another author. How will you categorize this violation? A. Phishing B. Plagiarism (Correct Answer) C. Libel D. Slander 51. Monica recently heard about copyright. She wants to know what actions violate copyright. Which one of the following actions is a copyright violation? A. Sharing a Web site address B. Reading material from a publicly available Web site C. Copying software and distributing it to your friends (Correct Answer) D. Quoting a paragraph and mentioning the source
  • 14. 52. For a project, Bill decides to use content from a Web site. However, he forgets to state the source. What has Bill done? A. Libel B. Plagiarism (Correct Answer) C. Gambling D. Defamation 53. Ken decides to download the latest song from his favorite band from a publicly available Web site and share it with his friends. What is Ken doing? A. Breaching copyright (Correct Answer) B. Breaching security C. Slandering the singer D. Violating privacy Objective 5.2 Identify the various legal concerns associated with information exchange. 54. Glenn notices that his colleague is making false statements about him in an online public forum. What is Glenn's colleague doing? A. Plagiarism B. Defamation (Correct Answer) C. Gambling D. Phishing