Microsoft Digital Literacy
Security and Privacy
Test Item File
Lesson 1: An Overview of Computer Security and Privacy
Objective 2.1 Explain what the terms security and privacy mean as they apply to computing.
1. You accidentally delete a registry file. Now you cannot start your computer.
What kind of computer threat is this?
- Spoofing
- Phishing
- Software piracy
- Human error
2. Someone has tampered with your computer and erased data.
What kind of computer threat is this?
- Physical theft
- Security
- Environmental
- Spyware
3. You want a new stand-alone computer.
What will you do to prevent others from accessing your confidential data in this computer?
- Use an uninterruptible power supply (UPS) and a surge protector.
- Use a user name and password.
- Back up data and save it in a different location.
- Install a spyware program and an antivirus program.
4. Your computer does not work when it heats up.
What is affecting your computer in this case?
- Hackers trying to access your computer
- Firewall installed in your computer
- Many programs opened simultaneously
- Environment surrounding your computer
5. After a voltage fluctuation, your computer stops working.
What will you do to prevent this problem in the future?
- Use a surge protector.
- Install an antivirus program.
- Use spyware.
- Back up data.
6. Your friend is confused with the terms privacy and security. She comes to you with a list of threats to computers.
Which of the following threats will you categorize as a threat to computer privacy?
- Accidental erasure of data
- Hardware failure
- Damage to computer because of an earthquake
- Theft of confidential data
7. There is a hurricane alert in your area.
Which one of the following actions will you take to protect the data in your computer?
- Install a virus protection program.
- Store the data in a safe location.
- Install anti-spywarespyware-fighting software.
- Install a firewall to prevent hacking.
8. Frequent power outages happen in your area.
How can you protect your computer from this when a power outage happens?
- Use an uninterruptible power supply (UPS).
- Use a firewall.
- Use a surge protector.
- Install an antivirus program.
9. You spilled coffee on your computer.
What kind of threat is this?
- Human error
- Natural disaster
- Environmental threat
- Hacking
10. You receive an e-mail message. The sender of the message claims to be a bank executive and wants your personal information to open an account for you.
Which one of the following terms describes this activity?
- Spoofing
- Spying
- Hacking
- Phishing
11. You are unable to log on to your e-mail account. You realize that someone has changed the password without your knowledge.
Which one of the following terms describes this activity?
- Phishing
- Spoofing
- Spamming
- Cracking
12. The system administrator informs you that a Trojan horse has infected your computer.
Which program did the system administrator use to determine this?
- Microsoft® Windows® Firewall
- Microsoft® Internet Explorer®
- Antivirus
- Uninterruptible power supply (UPS)
13. You cannot access a file in a computer that belongs to your friend.
What prevents you from accessing the file?
- Spyware
- Firewall
- Antivirus
- Uninterruptible power supply (UPS)
14. The network administrator informs you that Niraj is viewing inappropriate Web sites. A program installed on Niraj's computer monitors his browsing activities without his knowledge.
What type of program is installed on Niraj's computer?
- Antivirus
- Microsoft® Windows® Update
- Spyware
- Firewall
Lesson 2: Protecting Your Computer and Your Data
Objective 2.1 Identify the various methods of protecting the operating system, software, and data in your system.
15. Northwind Traders wants to grant network access only to specific employees.
Which of the following methods can help Northwind Traders restrict the use of the network?
A. Lock combination
B.. Data encryption
C. Data backup.
D. User identification
16. You need to go to an urgent meeting. You do not want your colleagues to use your computer in your absence.
Which of the following methods will you use to ensure that no one uses your computer while you are away?
A. Turn off the monitor.
B. Use Lock Computer button.
C. Use a firewall.
D. Install updates for your computer.
17. Tulin sets a password for her computer. However, she suspects that someone is accessing her computer in her absence.
Which of the following methods will help Tulin ensure that nobody accesses her computer without her permission?
A. Use an anti-spywarespyware-fighting program.
B. Update the operating system.
C. Deploy a firewall.
D. Change the password frequently.
18. Your friend installs security patches on his computer.
Which of the following benefits will these security patches provide?
A. Protecting the computer from malicious attacks
B. Updating the antivirus program
C. Creating periodic backups
D. Preventing spam e-mail messages
Objective 2.2 Identify the various means of securing online and network transactions.
19. Robert works for Blue Yonder Airlines. Managers of his organization notice that some employees use corporate applications for unethical purposes.
Which of the following tools can managers use to check this unethical practice?
A. Antivirus program
B. Spyware
C. Cookies
D. Firewall
20. Tony wants to purchase books from a Web site.
Which of the following will ensure that the Web site is secure for online transactions?
A. Microsoft® Windows® Firewall
B. Secure Sockets Layer (SSL)
C. Cookies
D. Antivirus program
21. Your friend wants to know about Secure Sockets Layer (SSL).
What will you explain to him?
A. A means of checking if a document on the Web is genuine
B. A standard and a secure way of presenting information
C. A means to validate the identity of the user who accesses a Web site
D. A standard for encoding information that is sent over the Web
22. Syed visits his friend Karen. He uses her computer to perform multiple banking transactions online. He wants to ensure that after he leaves, no one else can know which Web sites he visited.
Which of the following actions will he perform to ensure this? Select three.
A. Enable active content
B. Disable Microsoft® Windows® Firewall
C. Delete cookies
D. Reset Web settings
E. Clear browser cache
F. Empty Recycle Bin
G. Clear history
23. Apurva Dalia wants to set a password for his online banking account.
Which of the following passwords is a strong password?
A. Password
B. ABC
C. ApurvaDalia
D. ADalia#175
24. Your friend wants to know about the methods for securing online and network transactions.
Which of the following methods will you suggest to her? Select two.
A. Check history files.
B. Disable Automatic Updates.
C. Enable Microsoft® Windows® Firewall.
D. Use strong passwords.
E. Enable active content.
Objective 2.3 Identify the common measures for securing e-mail and instant messaging transactions.
25. Viktor likes to exchange e-mail messages with his friends. Every day, he receives many messages with attachments. Viktor wants to protect his computer from virus attacks by e-mail.
Which of the following guidelines will Viktor apply to protect his computer?
A. Reply to spam e-mail messages
B. Copy attachments to his computer before opening them.
C. Avoid opening e-mail attachments from unknown users.
D. Reinstall the e-mail client periodically.
26. Your friend uses instant messaging to chat with friends. He wants to ensure that his instant messaging transactions are secure.
Which of the following guidelines will you suggest?
A. Chat with only one user at a time.
B. Use different programs to chat with different users
C. Open attachments received over chat.
D. Chat with known users.
27. You receive an e-mail message from an unknown user. This message includes an .exe file as an attachment.
What will you do with this message?
A. Install the .exe file.
B. Save the attachment on your computer.
C. Delete the message.
D. Move the message to another folder.
28. Manish wants to know about some common guidelines for securing e-mail transactions.
Which of the following guidelines will you suggest to him?
A. Archive e-mail messages that include attachments.
B. Save junk e-mail messages in a separate folder.
C. Reply to spam e-mail messages.
D. Delete e-mail messages that include attachments from unknown users.
29. Milena receives several e-mail messages in a day. Her mailbox holds messages from her bank, Internet service provider (ISP), and friends. She also has unsolicited messages about products and discounts.
Which of the following messages in Milena's mailbox is a spam message?
A. Account details from her bank
B. E-mail account details from her ISP
C. Commercial information from an unknown sender
D. A message from a friend that includes family pictures
Lesson 3: Protecting Identify the common measures used to protect privacy.
Objective 3.1 Identify the common measures used to protect privacy.
30. Your friend wants to ensure that his project data is secure and can be restored in case of an environmental disaster.
Which of the following measures will you suggest to him?
A. Maintain a backup in a secure location.
B. Update the antivirus program.
C. Use Microsoft® Windows® Update.
D. Install an anti-spywarespyware-fighting program.
31. You receive an e-mail message from an unknown e-mail address. The message requests you to share your credit card details to receive a discount on some music CDs.
What will you do with this message?
A. Reply to the message to provide your credit card details.
B. Encrypt the message.
C. Scan the message for viruses.
D. Delete the message.
32. Karim wants to send confidential information over e-mail to his colleague.
Which of the following measures will he apply to ensure the privacy of the e-mail message?
A. Use an anti-spywarespyware-fighting program.
B. Encrypt the e-mail message.
C. Use e-mail filters.
D. Maintain a backup of the e-mail message.
33. Gloria uses the Internet frequently for online purchasing. To protect her system from virus attacks, she installs an antivirus program. However, within a few days, she gets a virus alert on her system.
Which of the following measures will she implement to prevent this virus in the future?
A. Update and run virus scans daily.
B. Update the Internet browser.
C. Check Microsoft® Windows® Update.
D. Use a strong password.
34. You want to encrypt a confidential e-mail message before you send it to your colleague.
Which of the following programs will you use to encrypt the message?
A. Firewall
B. Spyware
C. Microsoft® Office Outlook®2003
D. Microsoft® Windows® Update
35. Pia wants to verify that the system she is using is updated with the latest security patches.
Which of the following options will she use to check these settings?
A. Microsoft® Outlook® Express
B. Microsoft® Office Outlook® 2003
C. Microsoft® Office
D. Microsoft® Windows® Update
36. You want to purchase DVDs from a Web site.
Which of the following options will you use to verify that the Web site is secure for online transactions?
A. Encryption tool
B. Automatic Updates icon
C. Locked padlock icon
D. Internet service provider (ISP) logo
37. Lina is unable to access the e-mail account that her Internet service provider (ISP) provides. She realizes that someone has hacked into her account.
What action will she take to remedy this issue?
A. Protect her computer from surges and spikes
B. Use Microsoft® Windows® Update
C. Install spyware
D. Report the incident to her ISP
Objective 3.3 Identify the guidelines to protect your children from online predators.
38. You want to educate your family about the signs of an online predator.
Which of the following signs will you share with your family?
A. Sends viruses
B. Tries to involve you in a relationship
C. Steals passwords
D. Sends junk e-mail messages
39. Naoki notices that his teenage children like to chat online.
Which of the following guidelines will Naoki recommend to ensure their safety from online predators?
A. Chat only with people they know.
B. Use private chat areas.
C. Install multiple chat programs.
D. Chat with one person at a time.
40. Your children need to access the Internet frequently. Therefore, you install an Internet connection on your computer.
Which of the following precautions will you take when your children access the Internet?
A. Regularly check the Web sites your children visit.
B. Block Web sites that offer free e-mail accounts.
C. Block all search engines.
D. Recommend use of chat rooms instead of e-mail.
41. Your niece uses the Internet frequently. You want to block some Web sites that are inappropriate for her age group.
How will you block these Web sites?
A. Update the antivirus program.
B. Install spyware.
C. Use filter programs.
D. Check Microsoft® Windows® Update.
42. Tamer's children use the Internet to chat with their friends. He wants to protect his children from online predators.
Which of the following guidelines will you recommend?
A. Update the operating system
B. Deploy a firewall.
C. Block Web sites that offer free chat programs.
D. Set up a program that monitors online chat.
43. You see your friend chatting with an unknown user.
Which of the following guidelines will you recommend to ensure safety over chat?
A. Close the chat program.
B. Reply to users who seek your personal information.
C. Share personal information only with people you trust.
D. Use private chat areas.
44. Kitti receives an e-mail message from an unknown e-mail address offering discounts on game CDs. As specified in the message, Kitti needs to share his name, age, and contact information to receive the discount.
Which of the following actions does Kitti need to take?
A. Send his personal information to receive the discount.
B. Delete the e-mail message.
C. Use an anti-spywarespyware-fighting program.
D. Forward the e-mail message to friends.
Lesson 4: Keeping Your Computer Secure and Updated
Objective 4.1 Explain the purpose of different security settings on your computer.
45. Jim discovers that his son visits Web sites that are inappropriate for his age. Jim wants to restrict access to these sites.
Which of the following security settings will help Jim to block these sites?
A. Microsoft® Windows® Firewall
B. Internet Options
C. Automatic Updates