CSC 101 Module 6 (Latest update), Questions and answers with Complete Solutions
_____ ensures that the person requesting access to a computer is not an
imposter.
A) Data mining
B) Authentication
C) Encryption
D) Automatic encoding - ✔✔- B:Authentication
After Penny broke up with her boyfriend, he texted some teammates from
the track team about some private and intimate moments he and Penny had
shared while they were dating. He even lied about their breakup, creating
rumors about her behavior. Penny started getting inappropriate looks and
advances from the team whenever she was at practice and felt completely
humiliated. Penny is a victim of ________.
A) cyberstalking
B) cyberbullying
C) social engineering
D) data mining - ✔✔- B:cyberbullying
Cassidy is a medical assistant in a hospital and has access to many medical
files. When she brings patients to the examining room, she can be observed
swiping a card, typing in a password, and staring into what appears to be a
camera, all attached to the computer. After completing her check-in,
Cassidy leaves the patient in the examining room waiting on the doctor. It is
important that she logs out of the system so the patient does not have
access to the information stored in the hospital's database. Based on
Cassidy's actions what systems do you think the hospital has in place to
protect the patient medical records?
A) Digital certificates
B) Two factor authentication
C) Biometrics
D) Encryption - ✔✔- C:Biometrics