Here are the suggested answers for the questions provided:
Question 30
A) Jose is very careful about preventing malware from infecting his computer. In addition to avoiding suspicious email attachments and resisting the temptation of clicking on pop-up ads, which of the following methods could Jose use to keep his computer safe?
Response: install an antivirus program
Question 31
A) Which of the following refers to an attempt to compromise a device by gaining unauthorized access?
Response: hacking
Question 32
A) Natasha recently received an email from her bank that had the bank’s official logo and looked legitimate. The email asked her to respond with information such as her full name, address, and Social Security number to update her customer profile. What type of hacking technique was Natasha almost a victim of?
Response: phishing
Question 33
A) Which of the following is a sign of a phishing attempt?
Response: incorrect spelling and grammar
Question 34
A) Sandra recently received an email regarding her Venmo account. The email stated that she needed to act in the next 30 minutes and use the provided link to update her profile information or she would lose access to her Venmo balance. The email included the Venmo logo and looked legitimate. How did Sandra know that this email was a phishing attempt?
Response: the sense of urgency
Question 35
A) Which of the following is used by companies to prevent hackers from accessing the company’s computer networks?
Response: firewall
Question 36
A) Eric is installing something to protect his company’s computer network from internal threats such as a computer passing a virus on to another computer in the company’s network. What is Eric installing?
Response: software firewall
Question 37
A) Which of the following detection tools detects a potential threat, but rather than blocking the threat, reports it to a network administrator?
Response: intrusion detection system
Feel free to ask if you need more information or explanations!