Protecting Your Devices and Network
Data Maintenance
Strong Authentication
Sharing Too Much Information
Fun Facts
100

What is the purpose of an antivirus program?

to scan, detect and remove viruses from your computer.

100

What is Encryption?

Encryption is the process of converting the information into a form where an unauthorized party cannot read it

100

Is there ever too much authentication?
   

No, you can never have too many.

100

Why should someone put the minimum required information in making a social media account?

You should not share information like your birth date, email address, or your phone number on your profile.

100

Do Software updates affect computer security?

Most software developers regularly release updates to address specific security issues

200

What is the best way to protect your IoT device from vulnerabilities

Have IoT devices using an isolated network, sharing it only with other IoT devices.

200

Examples of valuable information prone to hackers are?

account numbers and passwords, and other official documents.

200

What are examples of Biometric scan?

fingerprint, palm print, as well as facial or voice recognition

200

Why is incognito mode a more secure method to browse the web?

With private mode enabled, cookies are disabled, and temporary Internet files and browsing history are removed after closing the window or program.

200

Are Macs are safe from malware?

Today, Apple's share of the personal-computer market has grown significantly, and along with that has come a marked increase in the amount of malware affecting Macs. One study said Macs saw five times as many malware attacks in 2015 than in 2010 through 2014 combined.

300

Tips for choosing a good password paraphrase?

Choose a meaningful statement to you. Add special characters, such as ! @ # $ % ^ & * ( ). The longer the better. Avoid common or famous statements, for example, lyrics from a popular song.

300

If your hard drive were to fail and crash, what are the two common methods for Data Backups.

Cloud and local external drives

300

What are examples of Physical Objects that can be used?

credit card, ATM card, phone, or fob

300

Is deleting a message is truly deleted?

Even when you erase your email messages, the messages can be archived on the mail servers for some time.

300

Are Well-known websites are safe?

Even the best-known websites can be corrupted with malware it's happened to Yahoo, The New York Times, BBC, and AOL in the past two years. A common criminal tactic is to place malicious online ads also known as malvertising

400

How can Bluetooth be exploited by hackers?

Hackers have the ability to eavesdrop on some devices, establish remote access controls, distribute malware, and drain the batteries of the device.

400

What is an EFS

Windows feature that can encrypt data. EFS is directly linked to a specific user account. Only the user that encrypted the data will be able to access it after it has been encrypted using EFS.

400

a security process in which the user provides two different authentication factors to verify themselves to better protect both the user's credentials and the resources the user can access.

Two factor Authentication

400

Why should you put the false answers to personal security questions

Those who want access to your account can find the answers on the internet. Answering with false questions will make them more secure but on the downside, harder to remember.

400

Can Antivirus software will protect my computer from all malware?

Unfortunately, no single antivirus product is 100 percent effective. Hackers constantly look for ways around antivirus software and firewalls

500

How can the following be exploited?: A flaw that allows an intruder to break the encryption between a wireless router and a wireless client, allowing the intruder to access and manipulate the network traffic

KRACK

500

Why is the simple process of deleting a file insecure?

Traces on the magnetic hard drive are still left and are recoverable, the most secure method of deleting a file and personal information is through physical destruction. The SDelet program also works as it overwrites the program into different ones and zeros.

500

What is 0Auth

    

an open standard protocol that allows an end user’s credentials to access third party applications without exposing the user’s password.

 

500

What can occur that makes web browsing and emailing less private?

Physically going through ones computer, Anyone with physical access to your computer, or your router, can view which websites you have visited using web browser history, cache, and possibly log files

500

Does Malware will destroy your computer?

Malware is just software and shouldn't affect a computer's physical parts. If you completely reformat the hard drive of a severely infected computer, you can install a clean operating system

M
e
n
u