Threats to computer security
Prevention and protection strategies
Risks associated with sharing personal information online
Tips for protecting personal information online
Identifying fake news and sources of information
100

What is phishing? 

  1. A type of fishing sport 
  2. A method used to obtain sensitive information by disguising as a trustworthy entity 
  3. A type of malware that encrypts files and demands ransom

Answer: 2. A method used to obtain sensitive information by disguising as a trustworthy entity.

100

What is the first step in developing a prevention and protection strategy? 

a) Identify potential risks and threats 

b) Implement security measures 

c) Train employees on security protocols 

d) Conduct a risk assessment

a) Identify potential risks and threats

100

What is the most common risk associated with sharing personal information online? 

a) Getting free stuff 

b) Making new friends 

c) Identity theft 

d) Finding job opportunities


Answer: c) Identity theft

100

When creating passwords, which of the following is the strongest option?

a)Your name 

b)A single word 

c)A phrase 

d)A pattern


Answer: c) A phrase

100

Which of the following is NOT a red flag that an article may be fake news?

 a) The article is published on a website with a strange or unfamiliar domain name. 

b) The article uses sensational or exaggerated language to describe events. 

c) The article cites multiple sources to back up its claims. 

d) The article contains spelling and grammatical errors.


Answer: c) The article cites multiple sources to back up its claims. While it is generally a good sign when an article cites sources, it is possible for fake news to cite sources that are unreliable or nonexistent.

100

What is malware? 

1. A type of software that is designed to harm or damage computer systems 

2. A type of computer hardware that is prone to failure 

3.A type of computer network that is vulnerable to attacks

Answer: 1. A type of software that is designed to harm or damage computer systems.

100

Which of the following is an example of a physical security measure? 

a) Firewall 

b) Encryption 

c) CCTV cameras 

d) Two-factor authentication

c) CCTV cameras


100

How can sharing personal information online lead to online reputation damage? 

a) By making new friends online 

b) By sharing information about your hobbies and interests 

c) By posting inappropriate or controversial information that may be seen by potential employers, colleagues, or other important people in your life 

d) By sharing positive and uplifting messages


Answer: c) By posting inappropriate or controversial information that may be seen by potential employers, colleagues, or other important people in your life

100

Which of the following is NOT a way to protect your personal information online? 

a) Using two-factor authentication 

b) Sharing your passwords with friends 

c) Keeping your software up to date 

d) Using a VPN


Answer: b) Sharing your passwords with friends

100

Which of the following is a reliable source of news? a) A personal blog written by an anonymous author. b) A news article published on a well-known and reputable news website. 

c) A post on social media that has been shared thousands of times. 

d) A video on YouTube created by a conspiracy theorist.


Answer: b) A news article published on a well-known and reputable news website. Personal blogs and videos created by conspiracy theorists are not necessarily reliable sources of information, and social media posts can be easily manipulated and shared without fact-checking.

100

What is a firewall? 

1. A type of antivirus software 

2. A program or hardware device that filters network traffic to prevent unauthorized access 

3. A type of hacker tool used to gain access to computer systems

Answer: 2. A program or hardware device that filters network traffic to prevent unauthorized access.


100

What is the purpose of a business continuity plan? 

a) To prevent security breaches 

b) To recover from security breaches 

c) To train employees on security protocols 

d) To implement security measures

b) To recover from security breaches


100

What is the risk of cyberbullying? 

a) You might become more popular online 

b) You might receive more likes and followers 

c) Cyberbullies can use personal information such as your email address, phone number, or location to harass or intimidate you online 

d) You might make new friends online


Answer: c) Cyberbullies can use personal information such as your email address, phone number, or location to harass or intimidate you online

100

Which of the following is a red flag for an email or message that may be a phishing attempt? 

a) The sender's email address is familiar 

b) The message is urgent 

c) The message asks for personal information d) The message contains correct grammar and spelling


Answer: c) The message asks for personal information

100

Which of the following is a reliable fact-checking website? 

a) Snopes.com 

b) Newsmax.com 

c) Breitbart.com 

d) Infowars.com


Answer: a) Snopes.com. Snopes.com is a well-known and reputable fact-checking website that has been in operation since 1995. Newsmax.com, Breitbart.com, and Infowars.com are all known for publishing politically biased content and are not considered reliable sources of information.

100

What is a brute-force attack? 

1. A type of attack that involves guessing a password by trying every possible combination 

2. A type of phishing attack that tricks users into revealing sensitive information

3. A type of malware that replicates itself and spreads to other systems

Answer: 1. A type of attack that involves guessing a password by trying every possible combination.

100

What is the best way to prevent social engineering attacks? 

a) Implementing technical controls 

b) Training employees on security awareness

c) Installing antivirus software 

d) Conducting regular vulnerability scans

b) Training employees on security awareness


100

What is the risk of sharing personal information such as your location or routine online?

a) Winning a prize 

b) Getting more likes and followers 

c) Being stalked 

d) Making new friends online


Answer: c) Being stalked

100

Which of the following is a way to prevent identity theft? 

a) Using strong passwords 

b) Shredding documents that contain personal information 

c) Reviewing your credit report regularly 

d) All of the above


Answer: d) All of the above

100

Which of the following is NOT a good way to fact-check a news article? 

a) Checking other news websites to see if they are reporting the same information. 

b) Looking for the author's credentials and background information. 

c) Checking the article's publication date to make sure it is recent. 

d) Assuming that the article must be true if it aligns with your political beliefs.


Answer: d) Assuming that the article must be true if it aligns with your political beliefs. Confirmation bias can lead people to accept information that reinforces their pre-existing beliefs, even if that information is not accurate.


100

What is social engineering? 

1. A type of attack that uses social media to gain access to sensitive information 

2. A type of attack that targets human behavior to trick people into revealing sensitive information 

3. A type of attack that exploits vulnerabilities in computer software

Answer: 2. A type of attack that targets human behavior to trick people into revealing sensitive information.

100

What is the most effective way to secure sensitive data? 

a) Encrypting the data 

b) Backing up the data 

c) Storing the data on a secure server 

d) Deleting the data

a) Encrypting the data



100

If a lot of companies have your personal information what might happen?

a) You will get a lot of dms

b) You will get famous

c) You will get rich

d) You will get targeted by Advertisers

Answer: d) You will get targeted by Advertisers.


100

Which of the following is a way to protect your online privacy? 

a) Using social media platforms without adjusting privacy settings 

b) Sharing personal information with strangers online 

c) Using a VPN 

d) None of the above




Answer: c) Using a VPN

100

Which of the following is a red flag that a source of information may be unreliable? 

a) The source has a clear bias or agenda. 

b) The source has a long history of accurate reporting. 

c) The source is widely respected and trusted by the general public. 

d) The source has been recommended by a friend or family member.


Answer: a) The source has a clear bias or agenda. While some sources with a clear bias or agenda may still be reliable, it is important to be aware of potential biases when evaluating information. A long history of accurate reporting, wide public trust, and recommendations from friends or family members are not enough to guarantee the reliability of a source

M
e
n
u