Navigation » List of Schools, Subjects, and Courses » INT 1010 – Introduction to Information Technology » Assignments » Chapter 8 Quiz
No Answers We dont have answer to this question yet. If you need help with your homework send us an email or chat with our tutors
Chapter 8 Quiz
Chapter 8 Quiz
• Question 1
2.5 out of 2.5 points
Which of the following describes what encrypting data means?
• Question 2
2.5 out of 2.5 points
Unsolicited e-mail messages sent from advertisers or cyber criminals are __________
• Question 3
2.5 out of 2.5 points
The tools that cyber criminals often use, including computer viruses, worms, trojan horses and spyware, are called __________.
• Question 4
0 out of 2.5 points
Would the following incident be an example of social engineering/phishing? You receive an e-mail from the local police department asking you to update your information so that alerts can be sent out to you. The information requested includes your driver’s license number and telephone number.
• Question 5
0 out of 2.5 points
You live “out in the middle of nowhere” and feel there is no need to protect your internet connection because there is no one that lives near you. One day you are unable to connect to the internet. After calling tech support you find that someone has hacked into your router and has changed all the settings. Fortunately the hacker only wanted to use your internet connection and did not view any information on your computer. Your decision to leave your router unprotected opened you to which of the following risks?
• Question 6
2.5 out of 2.5 points
Online social networks are a totally safe environment in which to expand one’s contacts and meet people from any part of the world.
• Question 7
2.5 out of 2.5 points
Having your personally identifiable information compromised is most closely related to __________
• Question 8
2.5 out of 2.5 points
Which of the following would most likely prevent your becoming a victim of cyberstalking while using social networking?