Microsoft Digital Literacy Security and Privacy Test Item File Answer Key Lesson 1: An Overview of Computer Security and Privacy Objective 1.1 Explain what the terms security and privacy mean as they apply to computing. 1. You accidentally delete a registry file. Now you cannot start your computer. What kind of computer threat is this? A. B. C. D. Spoofing Phishing Software piracy Human error (Correct Answer) 2. Someone has tampered with your computer and erased data. What kind of computer threat is this? A. B. C. D. Physical theft Security (Correct Answer) Environmental Spyware 3. You want a new stand-alone computer. What will you do to prevent others from accessing your confidential data in this computer? A. B. C. D. Use an uninterruptible power supply (UPS) and a surge protector. Use a user name and password. (Correct Answer) Back up data and save it in a different location. Install a spyware program and an antivirus program. 4. Your computer does not work when it heats up. What is affecting your computer in this case? A. B. C. D. Hackers trying to access your computer Firewall installed in your computer Many programs opened simultaneously Environment surrounding your computer (Correct Answer) 5. After a voltage fluctuation, your computer stops working. What will you do to prevent this problem in the future? A. B. C. D. Use a surge protector. (Correct Answer) Install an antivirus program. Use spyware. Back up data. 6. Your friend is confused with the terms privacy and security. She comes to you with a list of threats to computers. Which of the following threats will you categorize as a threat to computer privacy? A. B. C. D. Accidental erasure of data Hardware failure Damage to computer because of an earthquake Theft of confidential data (Correct Answer) 7. There is a hurricane alert in your area. Which one of the following actions will you take to protect the data in your computer? A. B. C. D. Install a virus protection program. Store the data in a safe location. (Correct Answer) Install spyware-fighting software. Install a firewall to prevent hacking. 8. Frequent power outages happen in your area. How can you protect your computer from this when a power outage happens? A. B. C. D. Use an uninterruptible power supply (UPS). (Correct Answer) Use a firewall. Use a surge protector. Install an antivirus program. 9. You spilled coffee on your computer. What kind of threat is this? A. B. C. D. Human error (Correct Answer) Natural disaster Environmental threat Hacking 10. You receive an e-mail message. The sender of the message claims to be a bank executive and wants your personal information to open an account for you. Which one of the following terms describes this activity? A. B. C. D. Spoofing Spying Hacking Phishing (Correct Answer) 11. You are unable to log on to your e-mail account. You realize that someone has changed the password without your knowledge. Which one of the following terms describes this activity? A. B. C. D. Phishing Spoofing (Correct Answer) Spamming Cracking 12. The system administrator informs you that a Trojan horse has infected your computer. Which program did the system administrator use to determine this? A. B. C. D. Microsoft® Windows® Firewall Microsoft® Internet Explorer® Antivirus (Correct Answer) Uninterruptible power supply (UPS) 13. You cannot access a file in a computer that belongs to your friend. What prevents you from accessing the file? A. B. C. D. Spyware Firewall (Correct Answer) Antivirus Uninterruptible power supply (UPS) 14. The network administrator informs you that Niraj is viewing inappropriate Web sites. A program installed on Niraj's computer monitors his browsing activities without his knowledge. What type of program is installed on Niraj's computer? A. B. C. D. Antivirus Microsoft Windows Update (Correct Answer) Spyware Firewall Lesson 2: Protecting Your Computer and Your Data Objective 2.1 Identify the various methods of protecting the operating system, software, and data in your system. 15. Northwind Traders wants to grant network access only to specific employees. Which of the following methods can help Northwind Traders restrict the use of the network? A. Lock combination B. Data encryption C. Data backup. D. User identification (Correct Answer) 16. You need to go to an urgent meeting. You do not want your colleagues to use your computer in your absence. Which of the following methods will you use to ensure that no one uses your computer while you are away? A. B. C. D. Turn off the monitor. Use Lock Computer button. (Correct Answer) Use a firewall. Install updates for your computer. 17. Tulin sets a password for her computer. However, she suspects that someone is accessing her computer in her absence. Which of the following methods will help Tulin ensure that nobody accesses her computer without her permission? A. Use an spyware-fighting program. B. Update the operating system. C. Deploy a firewall. D. Change the password frequently. (Correct Answer) 18. Your friend installs security patches on his computer. Which of the following benefits will these security patches provide? A. Protecting the computer from malicious attacks (Correct Answer) B. Updating the antivirus program C. Creating periodic backups D. Preventing spam e-mail messages Objective 2.2 Identify the various means of securing online and network transactions. 19. Robert works for Blue Yonder Airlines. Managers of his organization notice that some employees use corporate applications for unethical purposes. Which of the following tools can managers use to check this unethical practice? A. Antivirus program B. Spyware (Correct Answer) C. Cookies D. Firewall 20. Tony wants to purchase books from a Web site. Which of the following will ensure that the Web site is secure for online transactions? A. B. C. D. Windows Firewall Secure Sockets Layer (SSL) (Correct Answer) Cookies Antivirus program 21. Your friend wants to know about Secure Sockets Layer (SSL). What will you explain to him? A. B. C. D. A means of checking if a document on the Web is genuine A standard and a secure way of presenting information A means to validate the identity of the user who accesses a Web site A standard for encoding information that is sent over the Web (Correct Answer) 22. Syed visits his friend Karen. He uses her computer to perform multiple banking transactions online. He wants to ensure that after he leaves, no one else can know which Web sites he visited. Which of the following actions will he perform to ensure this? Select three. A. B. C. D. E. F. G. Enable active content Disable Windows Firewall Delete cookies (Correct Answer) Reset Web settings Clear browser cache (Correct Answer) Empty Recycle Bin Clear history (Correct Answer) 23. Apurva Dalia wants to set a password for his online banking account. Which of the following passwords is a strong password? A. B. C. D. Password ABC ApurvaDalia ADalia#175 (Correct Answer) 24. Your friend wants to know about the methods for securing online and network transactions. Which of the following methods will you suggest to her? Select two. A. Check history files. B. Disable Automatic Updates. C. Enable Windows Firewall. (Correct Answer) D. Use strong passwords. (Correct Answer) E. Enable active content. Objective 2.3 Identify the common measures for securing e-mail and instant messaging transactions. 25. Viktor likes to exchange e-mail messages with his friends. Every day, he receives many messages with attachments. Viktor wants to protect his computer from virus attacks by e-mail. Which of the following guidelines will Viktor apply to protect his computer? A. B. C. D. Reply to spam e-mail messages Copy attachments to his computer before opening them. Avoid opening e-mail attachments from unknown users. (Correct Answer) Reinstall the e-mail client periodically. 26. Your friend uses instant messaging to chat with friends. He wants to ensure that his instant messaging transactions are secure. Which of the following guidelines will you suggest? A. B. C. D. Chat with only one user at a time. Use different programs to chat with different users Open attachments received over chat. Chat with known users. (Correct Answer) 27. You receive an e-mail message from an unknown user. This message includes an .exe file as an attachment. What will you do with this message? A. B. C. D. Install the .exe file. Save the attachment on your computer. Delete the message. (Correct Answer) Move the message to another folder. 28. Manish wants to know about some common guidelines for securing e-mail transactions. Which of the following guidelines will you suggest to him? A. B. C. D. Archive e-mail messages that include attachments. Save junk e-mail messages in a separate folder. Reply to spam e-mail messages. Delete e-mail messages that include attachments from unknown users. (Correct Answer) 29. Milena receives several e-mail messages in a day. Her mailbox holds messages from her bank, Internet service provider (ISP), and friends. She also has unsolicited messages about products and discounts. Which of the following messages in Milena's mailbox is a spam message? A. B. C. D. Account details from her bank E-mail account details from her ISP Commercial information from an unknown sender(Correct Answer) A message from a friend that includes family pictures Lesson 3: Protecting Identify the common measures used to protect privacy. Objective 3.1 Identify the common measures used to protect privacy. 30. Your friend wants to ensure that his project data is secure and can be restored in case of an environmental disaster. Which of the following measures will you suggest to him? A. B. C. D. Maintain a backup in a secure location. (Correct Answer) Update the antivirus program. Use Microsoft® Windows® Update. Install an spyware-fighting program. 31. You receive an e-mail message from an unknown e-mail address. The message requests you to share your credit card details to receive a discount on some music CDs. What will you do with this message? A. B. C. D. Reply to the message to provide your credit card details. Encrypt the message. Scan the message for viruses. Delete the message. (Correct Answer) 32. Karim wants to send confidential information over e-mail to his colleague. Which of the following measures will he apply to ensure the privacy of the e-mail message? A. B. C. D. Use an spyware-fighting program. Encrypt the e-mail message. (Correct Answer) Use e-mail filters. Maintain a backup of the e-mail message. 33. Gloria uses the Internet frequently for online purchasing. To protect her system from virus attacks, she installs an antivirus program. However, within a few days, she gets a virus alert on her system. Which of the following measures will she implement to prevent this virus in the future? A. B. C. D. Update and run virus scans daily. (Correct Answer) Update the Internet browser. Check Windows Update. Use a strong password. 34. You want to encrypt a confidential e-mail message before you send it to your colleague. Which of the following programs will you use to encrypt the message? A. B. C. D. Firewall Spyware Microsoft® Office Outlook®2003 (Correct Answer) Microsoft® Windows® Update 35. Pia wants to verify that the system she is using is updated with the latest security patches. Which of the following options will she use to check these settings? A. B. C. D. Microsoft Outlook Express Microsoft Office Outlook 2003 Microsoft Office Microsoft Windows Update (Correct Answer) 36. You want to purchase DVDs from a Web site. Which of the following options will you use to verify that the Web site is secure for online transactions? A. B. C. D. Encryption tool Automatic Updates icon Locked padlock icon (Correct Answer) Internet service provider (ISP) logo 37. Lina is unable to access the e-mail account that her Internet service provider (ISP) provides. She realizes that someone has hacked into her account. What action will she take to remedy this issue? A. B. C. D. Protect her computer from surges and spikes Use Microsoft® Windows® Update Install spyware Report the incident to her ISP (Correct Answer) Objective 3.3 Identify the guidelines to protect your children from online predators. 38. You want to educate your family about the signs of an online predator. Which of the following signs will you share with your family? A. B. C. D. Sends viruses Tries to involve you in a relationship (Correct Answer) Steals passwords Sends junk e-mail messages 39. Naoki notices that his teenage children like to chat online. Which of the following guidelines will Naoki recommend to ensure their safety from online predators? A. B. C. D. Chat only with people they know. (Correct Answer) Use private chat areas. Install multiple chat programs. Chat with one person at a time. 40. Your children need to access the Internet frequently. Therefore, you install an Internet connection on your computer. Which of the following precautions will you take when your children access the Internet? A. B. C. D. Regularly check the Web sites your children visit. (Correct Answer) Block Web sites that offer free e-mail accounts. Block all search engines. Recommend use of chat rooms instead of e-mail. 41. Your niece uses the Internet frequently. You want to block some Web sites that are inappropriate for her age group. How will you block these Web sites? A. B. C. D. Update the antivirus program. Install spyware. Use filter programs. (Correct Answer) Check Windows Update. 42. Tamer's children use the Internet to chat with their friends. He wants to protect his children from online predators. Which of the following guidelines will you recommend? A. B. C. D. Update the operating system Deploy a firewall. Block Web sites that offer free chat programs. Set up a program that monitors online chat. (Correct Answer) 43. You see your friend chatting with an unknown user. Which of the following guidelines will you recommend to ensure safety over chat? A. B. C. D. Close the chat program. Reply to users who seek your personal information. Share personal information only with people you trust. (Correct Answer) Use private chat areas. 44. Kitti receives an e-mail message from an unknown e-mail address offering discounts on game CDs. As specified in the message, Kitti needs to share his name, age, and contact information to receive the discount. Which of the following actions does Kitti need to take? A. B. C. D. Send his personal information to receive the discount. Delete the e-mail message. (Correct Answer) Use an spyware-fighting program. Forward the e-mail message to friends. Lesson 4: Keeping Your Computer Secure and Updated Objective 4.1 Explain the purpose of different security settings on your computer. 45. Jim discovers that his son visits Web sites that are inappropriate for his age. Jim wants to restrict access to these sites. Which of the following security settings will help Jim to block these sites? A. B. C. D. Windows Firewall Internet Options (Correct Answer) Automatic Updates Antivirus Options 46. Jack is annoyed with the pop-up messages that appear whenever he visits a Web site. He wants to block all of the pop-up messages. Which of the following security settings will help him to block all of the pop-up messages? A. B. C. D. Automatic Updates Windows Firewall Antivirus Options (Correct Answer) Internet Options 47. Martin wants to set Windows to automatically check for the latest security patches released by Microsoft. Which security settings will he use to check for the latest security patches at periodic intervals? A. B. C. D. Internet Options Windows Firewall Automatic Updates (Correct Answer) Antivirus Updates 48. Bill wants to understand the purpose of Windows Firewall. Which of the following options states the purpose of Windows Firewall? A. Installs security patches B. Restricts unauthorized access (Correct Answer) C. Blocks pop-up messages D. Blocks Web sites 49. Jim wants to block a Web site. Which of the following Internet Properties tabs will he use to do this? A. Security (Correct Answer) B. Content C. Privacy D. Connections Lesson 5: Computer Ethics Objective 5.1 Explain what the terms Intellectual Property and copyright mean as they apply to computing. 50. While reading a novel, you realize that the author has copied material from another author. How will you categorize this violation? A. B. C. D. Phishing Plagiarism (Correct Answer) Libel Slander 51. Monica recently heard about copyright. She wants to know what actions violate copyright. Which one of the following actions is a copyright violation? A. B. C. D. Sharing a Web site address Reading material from a publicly available Web site Copying software and distributing it to your friends (Correct Answer) Quoting a paragraph and mentioning the source 52. For a project, Bill decides to use content from a Web site. However, he forgets to state the source. What has Bill done? A. B. C. D. Libel Plagiarism (Correct Answer) Gambling Defamation 53. Ken decides to download the latest song from his favorite band from a publicly available Web site and share it with his friends. What is Ken doing? A. B. C. D. Breaching copyright (Correct Answer) Breaching security Slandering the singer Violating privacy Objective 5.2 Identify the various legal concerns associated with information exchange. 54. Glenn notices that his colleague is making false statements about him in an online public forum. What is Glenn's colleague doing? A. B. C. D. Plagiarism Defamation (Correct Answer) Gambling Phishing