ITE 152: Exam 3 Study Notes Newest Actual
Exam Complete Questions Ans Detailed
Answers Graded A+ 2025/2026.
_____ are attackers who want to attack computers but lack the knowledge
needed to do so.
Script kiddies
Each of the following is a factor that causes repetitive strain injury (RSI)
except _____.
b. lack of restful sleep
A worm is a malicious program that uses a computer network to replicate.
True
A _____ is a very short duration of a voltage increase that can be absorbed
by a surge protector.
Spike
Wi-Fi Protected Access 2 (WPA2) Personal encrypts wireless data
transmissions and limits who can access the Wi-Fi network.
True
When creating a strong password _____ is the most important element.
Length
_____ is the process of "scrambling" information in such a way that it
cannot be read unless the user possesses the "key."
Encryption
You have the right to see your credit information.
True
Which of the following is not a web browser setting for managing cookies?
Have all cookies automatically expire after 45 days.
Technology can lead to all of the following behavioral risks EXCEPT _____.
higher satisfaction with life
, How does discarding computers in a landfill affect the environment?
Lead and mercury in computer parts are seeping into the ground and
water supply.
You can configure your wireless router to protect your devices in all of the
following ways EXCEPT ____.
naming your router something you'll remember, like your street address
Creating a(n) _____ means copying files from a computer's hard drive and
storing them in a remote location.
data backup
Which of the following statements about browser security settings is
false?
You must keep your accumulated web history as long as you use the
browser.
What is a digital certificate?
Technology used to verify a user's identity
Which of the following forms of identity theft involves posing as a
legitimate researcher to ask for personal information?
pretexting
What type of security requires something you know and something you
have that no one else has?
two factor authentication
Which of the following is a characteristic of a strong password?
letters, numbers, and symbols
How will you decide which browser security settings to allow and which
ones to block?
I will need to review each browser security setting and use my best
judgment.
Your Facebook profile is private so there is no need to worry about your
boss ever seeing your posts such as your Spring Break pictures.
False
What would a password manager allow you to do?
Exam Complete Questions Ans Detailed
Answers Graded A+ 2025/2026.
_____ are attackers who want to attack computers but lack the knowledge
needed to do so.
Script kiddies
Each of the following is a factor that causes repetitive strain injury (RSI)
except _____.
b. lack of restful sleep
A worm is a malicious program that uses a computer network to replicate.
True
A _____ is a very short duration of a voltage increase that can be absorbed
by a surge protector.
Spike
Wi-Fi Protected Access 2 (WPA2) Personal encrypts wireless data
transmissions and limits who can access the Wi-Fi network.
True
When creating a strong password _____ is the most important element.
Length
_____ is the process of "scrambling" information in such a way that it
cannot be read unless the user possesses the "key."
Encryption
You have the right to see your credit information.
True
Which of the following is not a web browser setting for managing cookies?
Have all cookies automatically expire after 45 days.
Technology can lead to all of the following behavioral risks EXCEPT _____.
higher satisfaction with life
, How does discarding computers in a landfill affect the environment?
Lead and mercury in computer parts are seeping into the ground and
water supply.
You can configure your wireless router to protect your devices in all of the
following ways EXCEPT ____.
naming your router something you'll remember, like your street address
Creating a(n) _____ means copying files from a computer's hard drive and
storing them in a remote location.
data backup
Which of the following statements about browser security settings is
false?
You must keep your accumulated web history as long as you use the
browser.
What is a digital certificate?
Technology used to verify a user's identity
Which of the following forms of identity theft involves posing as a
legitimate researcher to ask for personal information?
pretexting
What type of security requires something you know and something you
have that no one else has?
two factor authentication
Which of the following is a characteristic of a strong password?
letters, numbers, and symbols
How will you decide which browser security settings to allow and which
ones to block?
I will need to review each browser security setting and use my best
judgment.
Your Facebook profile is private so there is no need to worry about your
boss ever seeing your posts such as your Spring Break pictures.
False
What would a password manager allow you to do?