Preventing Identity Theft and Cyberstalking Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the purpose of phishing?

  • To report cyberstalking to authorities
  • To encrypt internet traffic
  • To block internet criminals
  • To capture personal information by disguising as a trustworthy source (correct)

How can one identify a phishing email?

  • By providing personal details requested in the email
  • By clicking on all links in the email
  • By hovering the mouse over links without clicking (correct)
  • By ignoring any grammatical errors in the email

What should you do if you are a victim of cyberstalking?

  • Keep interacting with the perpetrator
  • Share your location with the perpetrator
  • Change your passwords regularly
  • Block the perpetrator and report it to the authorities (correct)

What is a common feature of pharming?

<p>Directing users to fake websites to capture personal information (B)</p> Signup and view all the answers

Which action helps prevent unauthorized access to your webcam?

<p>Covering your webcam when not in use (B)</p> Signup and view all the answers

What should you do if you receive an email asking for your credit card details?

<p>Ignore the request as banks won't ask for such details via email (B)</p> Signup and view all the answers

Why should you avoid opening links or messages from untrusted sources?

<p>To prevent being directed to harmful websites or malware (D)</p> Signup and view all the answers

What is the significance of using multi-factor authentication for passwords?

<p>It adds an extra layer of security to prevent unauthorized access. (D)</p> Signup and view all the answers

Why is using a VPN recommended for online activities?

<p>To hide internet traffic and activities through encryption. (B)</p> Signup and view all the answers

What can happen if you reveal private information online?

<p>You can become a victim of identity theft or data breaches. (C)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Identity Theft Risks Quiz
1 questions
Understanding Identity Theft and Crime
35 questions

Understanding Identity Theft and Crime

IrreplaceableEuphonium9889 avatar
IrreplaceableEuphonium9889
Use Quizgecko on...
Browser
Browser