A term that describes a non-technical kind of intrusion that relies heavily on human interaction and trickery. A) Social Engineering B) Pushing C) Brute Force D) Hacking E) Cracking Points Earned: 1. 0/1. 0 Correct Answer(s): A 2. You are working on a computer, which of the following activities are restricted according to our Acceptable use Policy: A) Creating a folder on your desktop B) Using a USB device on the computer C) Saving child pornography on the hard drive D) Adding a screener that comes with WindowsE) Installation of approved software Correct Answer(s): C 3.

Two or maybe three students may have the same surname but a different password. A) True B) False False Correct Answer(s): Which of the following methods IS NOT a way to distribute or notify users of the Acceptable use Policy? A) E-mail Notifications B) Signed Document C) A training session with signed attendance form D) Welcome banner on web sites E) Pop-up Click-through points Earned: I . 0/1. 0 5. System attacks or viruses sometimes play on computer weaknesses.Which of the installation of the operating system B) The computer is using a Windows operating system C) The computer system is unpatented or not updated D) The operating system installed came with the computer E) The computer system is owned by a new operator.