ITE115 Module 04: Security and Safety Quiz
20 Questions
100 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?

  • identity theft
  • phishing (correct)
  • encryption
  • dumpster diving
  • _____ ensures that the person requesting access to a computer is not an imposter.

    Authentication

    Your Facebook profile is private so there is no need to worry about your boss ever seeing your posts such as your Spring Break pictures.

    False

    How is a worm different from a Trojan?

    <p>A worm spreads through a network, whereas a Trojan hides inside another program.</p> Signup and view all the answers

    Social-networking sites have a history of providing tight security and giving users a clear understanding of how security features work.

    <p>False</p> Signup and view all the answers

    To prevent a laptop from being stolen, you can use a surge protector.

    <p>False</p> Signup and view all the answers

    What is a digital certificate?

    <p>Technology used to verify a user's identity</p> Signup and view all the answers

    What would a password manager allow you to do?

    <p>Create and store multiple strong passwords.</p> Signup and view all the answers

    How would you describe what is happening if Isabel received a message on her computer that appeared to be from the FBI, claiming her computer is locked and a fee is needed to retrieve her data?

    <p>It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.</p> Signup and view all the answers

    Which of the following is a characteristic of a strong password?

    <p>letters, numbers, and symbols</p> Signup and view all the answers

    With more and more people using technology, what physical health diagnosis is on the rise?

    <p>repetitive strain injury</p> Signup and view all the answers

    How can you protect a computer from electrical spikes and surges?

    <p>Use a surge protector.</p> Signup and view all the answers

    The news reports a security breach of credit card information at a large department store that has recently laid off many employees. Why should the store investigate the possibility of the breach being from an insider?

    <p>Because insiders sometimes create threats after incidents at their places of employment.</p> Signup and view all the answers

    Which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information?

    <p>pretexting</p> Signup and view all the answers

    Creating a(n) _____ means copying files from a computer's hard drive and storing them in a remote location.

    <p>data backup</p> Signup and view all the answers

    Which of the following types of websites typically provides the least security?

    <p>social media sites</p> Signup and view all the answers

    What can you tell Siobhan to help her use social networking safely?

    <p>Be cautious about what information she posts.</p> Signup and view all the answers

    How will you decide which browser security settings to allow and which ones to block?

    <p>I will need to review each browser security setting and use my best judgment.</p> Signup and view all the answers

    Which of the following is the strongest password?

    <p>H@veAGr3atDaY!</p> Signup and view all the answers

    Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?

    <p>Trojan</p> Signup and view all the answers

    Study Notes

    Phishing and Identity Theft

    • Phishing involves tricking individuals into revealing personal information through fraudulent emails or websites mimicking trusted entities such as banks.
    • Identity theft can occur through various methods, and phishing is a common tactic used by attackers.

    Authentication and Security

    • Authentication is crucial for confirming a user's identity and preventing unauthorized access to systems.
    • Digital certificates serve as technology that verifies a user's identity, enhancing security.

    Understanding Social Media Privacy

    • Misconception exists regarding privacy on social media; profiles may not be as secure as believed, and posts can still be visible to employers.
    • Social networking sites often lack robust security measures and can alter privacy settings without user notification.

    Malware Types

    • Worms self-replicate and spread across networks, while Trojans disguise themselves within legitimate programs but can lead to malicious actions.
    • Ransomware locks users out of their systems until a ransom is paid, posing a severe threat to personal data and access.

    Password Management

    • Strong passwords should include a mix of letters, numbers, and symbols to enhance security.
    • Password managers help users create and store complex passwords safely, reducing the risk of using easily guessable or repeated passwords.

    Physical and Cybersecurity Measures

    • Using a surge protector is essential to safeguard computers from electrical spikes and surges.
    • Employing physical security tools such as cable locks can help prevent laptop theft.

    Insider Threats and Data Breaches

    • Instances of insider threats should be investigated, especially in companies facing layoffs, as insiders may exploit their access to create security breaches.
    • Data backup involves saving files to remote locations, ensuring protection against data loss.

    Social Engineering Tactics

    • Pretexting is a tactic where attackers pose as legitimate individuals to extract personal information under false pretenses.
    • Being cautious with shared information on social media and reviewing security settings with careful judgment is necessary for maintaining online safety.

    Health Impacts of Technology

    • Increased technology usage correlates with rising cases of repetitive strain injuries among users, highlighting the need for ergonomic practices.

    Browser Security and User Awareness

    • Users should evaluate browser security settings based on individual judgment rather than widespread trends or recommendations from social media or friends.
    • Being discerning about links and downloads, especially from unfamiliar sites, can prevent malware infections like Trojans that compromise personal data.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge on security and safety concepts in the ITE115 Module 04. This quiz covers key terminology such as phishing and authentication, along with their definitions. Perfect for reinforcing your understanding of safeguarding personal information online.

    More Like This

    Phishing Attacks
    5 questions

    Phishing Attacks

    SparklingSheep avatar
    SparklingSheep
    Phishing Email Characteristics
    12 questions
    Use Quizgecko on...
    Browser
    Browser