Digital Foundation: Online Safety and Security

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What is the main risk of using an unsecured Wi-Fi network?

  • Your device's battery will drain faster
  • Your device will be slower
  • Other people on the same network can see your information (correct)
  • You will not be able to connect to the internet

What is the primary goal of phishing attacks?

  • To crash your device
  • To send spam emails
  • To steal sensitive information (correct)
  • To install malware on your device

What is a characteristic of a secure and trusted Wi-Fi network?

  • It has a weak network name
  • It does not require a password
  • It requires a password and has encryption enabled (correct)
  • It is open to the public

What is cybersecurity primarily concerned with?

<p>Protecting computer systems, networks, and data from unauthorized access (D)</p> Signup and view all the answers

Why is it important to have different passwords for each of your email and social media accounts?

<p>So you can reduce the risk of your information being compromised (C)</p> Signup and view all the answers

What is essential to create to keep your information safe from hackers?

<p>A strong password (C)</p> Signup and view all the answers

Where should you download and install software from?

<p>Trusted sources (A)</p> Signup and view all the answers

What is the main benefit of using strong and unique passwords?

<p>You can reduce the risk of your information being compromised (C)</p> Signup and view all the answers

What can prevent malware from accessing your information?

<p>Antivirus software (A)</p> Signup and view all the answers

What type of encryption is used to keep your information safe on a website?

<p>HTTPS (C)</p> Signup and view all the answers

What should you be cautious of when receiving an email with a promise of great wealth?

<p>A scam (C)</p> Signup and view all the answers

What can block malware from accessing your information?

<p>Blocking plugins (C)</p> Signup and view all the answers

What is essential to ensure when setting up a password-protected network?

<p>Use an encryption protocol like WEP, WPA, or WPA2 (D)</p> Signup and view all the answers

What indicates a secure connection on a website?

<p>HTTPS:// (A)</p> Signup and view all the answers

What is a risk of using open networks without passwords?

<p>Others can steal your data or monitor your activity (A)</p> Signup and view all the answers

What is the primary purpose of connectivity?

<p>To enable communication and data sharing (B)</p> Signup and view all the answers

Why is it important to ensure a network is genuine, secure, and trustworthy?

<p>To protect against hackers and data theft (B)</p> Signup and view all the answers

What is Wi-Fi an example of?

<p>Wireless connectivity (A)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Common Password Mistakes
6 questions

Common Password Mistakes

DeadOnRomanticism avatar
DeadOnRomanticism
Recognizing Weak Password Practices Quiz
5 questions
Password Creation Guidelines
10 questions

Password Creation Guidelines

HilariousRhodium3167 avatar
HilariousRhodium3167
Cyberbezpieczeństwo - Podstawowe Zasady
16 questions
Use Quizgecko on...
Browser
Browser