Question 30

A)
Jose is very careful about preventing malware from infecting his computer. In addition to avoiding suspicious email attachments and resisting the temptation of clicking on pop-up ads, which of the following methods could Jose use to keep his computer safe?
(1 point)
Responses
install an antivirus program
install an antivirus program
clear his search history
clear his search history
avoid the use of social media
avoid the use of social media
keep it fully charged at all times
keep it fully charged at all times
Question 31
A)
Which of the following refers to an attempt to compromise a device by gaining unauthorized access?
(1 point)
Responses
infecting a computer with a virus
infecting a computer with a virus
hacking
hacking
using quotation marks in a search engine
using quotation marks in a search engine
sending malware
sending malware
Question 32
A)
Natasha recently received an email from her bank that had the bank’s official logo and looked legitimate. The email asked her to respond with information such as her full name, address, and Social Security number to update her customer profile. What type of hacking technique was Natasha almost a victim of?
(1 point)
Responses
malware
malware
spyware
spyware
phishing
phishing
virus
virus
Question 33
A)
Which of the following is a sign of a phishing attempt?
(1 point)
Responses
full name of the addressee is used
full name of the addressee is used
active link in the email text
active link in the email text
official logo of the company sending the email
official logo of the company sending the email
incorrect spelling and grammar
incorrect spelling and grammar
Question 34
A)
Sandra recently received an email regarding her Venmo account. The email stated that she needed to act in the next 30 minutes and use the provided link to update her profile information or she would lose access to her Venmo balance. The email included the Venmo logo and looked legitimate. How did Sandra know that this email was a phishing attempt?
(1 point)
Responses
the sense of urgency
the sense of urgency
the official Venmo logo
the official Venmo logo
the request to update her user profile
the request to update her user profile
a link was provided in the email
a link was provided in the email
Question 35
A)
Which of the following is used by companies to prevent hackers from accessing the company’s computer networks?
(1 point)
Responses
Boolean search
Boolean search
malware
malware
phishing
phishing
firewall
firewall
Question 36
A)
Eric is installing something to protect his company’s computer network from internal threats such as a computer passing a virus on to another computer in the company’s network. What is Eric installing?
(1 point)
Responses
anti-hacking device
anti-hacking device
software firewall
software firewall
phishing attempt
phishing attempt
intrusion detection system
intrusion detection system
Question 37
A)
Which of the following detection tools detects a potential threat, but rather than blocking the threat, reports it to a network administrator?
(1 point)
Responses
intrusion detection system
intrusion detection system
software firewall
software firewall
phishing attempt
phishing attempt
password encryption

1 answer

Here are the suggested answers for the questions provided:

Question 30
A) Jose is very careful about preventing malware from infecting his computer. In addition to avoiding suspicious email attachments and resisting the temptation of clicking on pop-up ads, which of the following methods could Jose use to keep his computer safe?
Response: install an antivirus program


Question 31
A) Which of the following refers to an attempt to compromise a device by gaining unauthorized access?
Response: hacking


Question 32
A) Natasha recently received an email from her bank that had the bank’s official logo and looked legitimate. The email asked her to respond with information such as her full name, address, and Social Security number to update her customer profile. What type of hacking technique was Natasha almost a victim of?
Response: phishing


Question 33
A) Which of the following is a sign of a phishing attempt?
Response: incorrect spelling and grammar


Question 34
A) Sandra recently received an email regarding her Venmo account. The email stated that she needed to act in the next 30 minutes and use the provided link to update her profile information or she would lose access to her Venmo balance. The email included the Venmo logo and looked legitimate. How did Sandra know that this email was a phishing attempt?
Response: the sense of urgency


Question 35
A) Which of the following is used by companies to prevent hackers from accessing the company’s computer networks?
Response: firewall


Question 36
A) Eric is installing something to protect his company’s computer network from internal threats such as a computer passing a virus on to another computer in the company’s network. What is Eric installing?
Response: software firewall


Question 37
A) Which of the following detection tools detects a potential threat, but rather than blocking the threat, reports it to a network administrator?
Response: intrusion detection system


Feel free to ask if you need more information or explanations!