Loading

Module 1: Computer Security and Privacy

Notes
Study Reminders
Support
Text Version

Set your study reminders

We will email you at these times to remind you to study.
  • Monday

    -

    7am

    +

    Tuesday

    -

    7am

    +

    Wednesday

    -

    7am

    +

    Thursday

    -

    7am

    +

    Friday

    -

    7am

    +

    Saturday

    -

    7am

    +

    Sunday

    -

    7am

    +

Self Test
* Lesson 2 - PROTECTING YOUR COMPUTER SELF TEST [1]

ONE OF THE MOST EFFECTIVE WAYS TO PROTECT THE SOFTWARE AND DATA IN YOUR
COMPUTER IS TO RESTRICT THE USE OF YOUR COMPUTER TO A DEFINED SET OF
INDIVIDUALS. WHICH OF THE FOLLOWING METHODS CAN YOU USE FOR THIS PURPOSE?
Select all answers that apply.

Update your operating system.

Set up user accounts.

Install antivirus software.

Keep passwords secure.

You can restrict the use of your computer to a defined set of
individuals by setting up of user accounts and keeping your passwords
secure.

-------------------------

VARIOUS TYPES OF FILES ARE CREATED ON YOUR COMPUTER WHILE USING THE
INTERNET. SOME OF THESE MIGHT PRESENT A THREAT TO SECURITY, BUT ARE
ACTUALLY PRESENT FOR THE BENEFIT OF THE USER. WHICH OF THE FOLLOWING ARE
EXAMPLES OF SUCH FILES? Select all answers that apply.

Cookie.

Virus.

Active Content files.

Worm.

Cookies and active content files are files that have a basic function
of enriching the online experience of the user, though there are occasions
when they present a security threat.

-------------------------

WHICH OF THE FOLLOWING METHODS WILL YOU USE TO SECURE YOUR E-MAIL AND IM
TRANSACTIONS? Select all answers that apply.

Delete e-mail messages from unknown senders without opening them.

Forward unsolicited e-mail messages to a friend for advice.

Reply with personal information to an e-mail message if the sender is a
bank employee.

Avoid opening attachments received in instant messages.

It is a good practice to delete e-mail messages from unknown senders
without opening them and to avoid opening attachments received in instant
messaging. This helps secure your e-mail and IM transactions. However, you
should not forward unsolicited e-mail messages to a friend for advice. You
must also avoid replying with personal information to an e-mail message
even if the sender is a bank employee, unless you are sure that the mail is
from the bank itself and the information is required to be revealed.

-------------------------



Links:
------
[1]
http://alison.com/mod/scorm/player.php?a=306¤torg=eXeRM_Module44823c6301d2c8becd92&scoid=14616