18 Questions
What is social infiltration often used to accomplish?
Gaining access or information through deception or manipulation
What is a potential consequence of not protecting your device?
Spammers could use your computer to send spam that looks like it came from you
What type of social engineering tactic involves leaving a malware-infected device in a public area for someone to find?
Baiting
What is a built-in software feature in Windows and macOS that helps secure computers from hackers?
Firewall
Why do we need to protect our devices and network?
To safeguard data, prevent identity theft, and maintain privacy
What type of malware demands payment in exchange for restoring access to data?
Ransomware
What is a type of social engineering tactic that involves creating a fake online identity to deceive victims?
Online impersonation
What network attack involves flooding a network with traffic in an attempt to overwhelm it?
Denial of Service (DoS) attack
What is a type of malicious software that can be deposited on a computer to steal sensitive information?
Spyware
What is a common way to prevent insider threats?
Limiting access to sensitive information
What physical security measure involves following an authorized person into a secure area?
Tailgating
What is a type of technical infiltration that exploits vulnerabilities in software or hardware?
Zero-day exploit
Which of the following can prevent cybercriminals from accessing your network and files even if they gain access?
Encryption
What is the primary purpose of using two-factor authentication?
To add an additional layer of protection against hackers
What is the recommended setting for a router to prevent intruders from infiltrating your network?
Secure, encrypted setup
What is the purpose of virtualization in protecting your network?
To run your browser in a virtual environment to sidestep your operating system
What is the primary benefit of backing up your data to Google's cloud backup system?
It is a seamless and straightforward process
What is the purpose of encrypting your Windows or macOS hard drive?
To prevent hackers from accessing your information
Learn how to protect yourself from social infiltration, online impersonation, and phishing scams. Understand the importance of securing your devices and networks in today's digital age.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free