COMPUTER FUNDAMENTALS

INTRODUCTION TO COMPUTERS

COMPUTER NETWORKS AND THE INTERNET

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the following activities poses the greatest personal cybersecurity risk?
A
Making a purchase on an online store that uses public key encryption to transmit information
B
Paying a bill using a secure online electronic payment system
C
Purchasing a couch by emailing a credit card number to the couch owner
D
Checking a bank account on a bank’s website that uses HTTPS for secure communication
Explanation: 

Detailed explanation-1: -Which of the following activities poses the greatest personal cyber security risk? Purchasing a chair by emailing a credit card number to the chair owner. Which of the following is considered an unethical use of computer resources?

Detailed explanation-2: -VPNs use encryption to create a secure connection over unsecured Internet infrastructure. VPNs are one way to protect corporate data and manage user access to that data. VPNs protect data as users interact with apps and web properties over the Internet, and they can keep certain resources hidden.

Detailed explanation-3: -Network Security. Most attacks occur over the network, and network security solutions are designed to identify and block these attacks. Cloud Security. Endpoint Security. Mobile Security. IoT Security. Application Security. Zero Trust.

There is 1 question to complete.