You post a picture on social media of you and your best friend. She is not comfortable with it and you agree to remove it. Will this ensure that no one else sees the picture?
No. Anything posted on the internet is virtually impossible to remove it from circulation. There is no guarantee that others have not already seen it and/or downloaded it to their machines.
A scammer creates a fake email and sends it to thousands of people, hoping some of them will click on a link and give up their personal information. What is this type of attack called?
Phishing - a type of social engineering that often manipulates human impulses, such as greed, fear or the desire to help others.
You are just about to enter the bank when you spot a flash drive on the ground. Do you: A- Leave it there, B- Take it home and use it, C- Format it and run a virus scan on it before using it?
A person who uses computers to gain unauthorized access to data.
A hacker?
Over 90% of successful cyberattacks start as phishing emails. True or False?
True
I can always trust emails and attachments I get from friends? True or False
False - New programs and viruses can send out emails to everyone in your friends inbox without their knowledge or consent.
If a public wi-fi network requires a password to access, it is generally safe to use that network for sensitive activities such as online banking. True or false?
False - When you use a public network, your device and traffic are vulnerable to anyone who is in the same hotspot or the hotspot owner.
B- Key Logger
Creating a fake facebook page for someone you know, or for someone you don't even know, is illegal. True or False?
True - impersonating someone else online is one form of identity theft. Penalties can be as high as $100,000 fine plus a minimum of ten years in prison.
Your office computer has been hacked; What do you do next? A - Restart your computer, B - Continue working until IT tells you what to do, C - Disconnect the computer from the internet and contact IT, D - Force shutdown your machine and leave it alone overnight?
C - disconnect the computer from the internet and contact IT.
You don't have to worry when you visit your favorite sites, like Facebook and gaming sites, because they are safe from spyware, malware and other threats. True or False?
False - Trusted sites can be safer, however what you do on those sites - such as clicking on posts with links or using apps- can put you at risk.
Turning off the GPS function of your smartphone prevents any tracking of your phone's location. True or False?
False - a study found that a device's time zone and information from it's sensors can be combined with public information like maps to estimate your location.
What is the weakest link in cybersecurity? A - Weak encryption, B - Humans, C - Short passwords?
B- Humans
Where sensitive, protected or confidential data has been potentially viewed, stolen or used by an authorized individual.
A data breach?
Which one of these things is most effective for maintaining your digital privacy? A - Unsubscribing from all spam emails, B - Covering your computer's front-facing camera, C - Not sharing personal information on social media?
C - not sharing personal information on social media.
Malware is a type of software designed to cause viruses. True or false?
True - malware is designed to cause damage or disruption to a computer system or to use a computer to send spam, distribute malware or launch an attack on other computers.
Most common way computers can get infected by computer viruses.
Opening attachments or links from unknown or spoofed emails?
A group of computers that is networked together and used by hackers to steal information is called ? A.- Botnet, B.- Rootkit, C.- DDoS, D.- Operating System, E.- Don't know?
Botnet
The amount of reported covid fraud losses by Americans from January till July 7th. A - $500 thousand, B- $38 million, C - $77 million, D - $2 billion
Which part of your car is the most vulnerable to hacking? A- Cruise Control, B - Entertainment System, C - Wireless key fob?
B - Entertainment system
When it comes to online shopping, you can safely shop from any site. True or false?
False - you should always shop from trusted and well-known websites. When banking or shopping, check to be sure the site has security enabled. Look for web addresses with "https://" instead of "http://"
If you don't protect the financial data used in commercial transactions on mobile devices, you could be subject to a $10,000 fine. True or False?
True - The Gramm-Leach-Bliley Act(GLBA) requires that personally identifiable financial information (PIFI) be secured at all times.
Criminals access someone's computer and encrypt the user's personal files and data. The user is unable to access this data unless they pay the criminals to decrypt the files. This practice is called?
Ransomware
Holds a computer or data hostage until a fee is paid
Ransomware?
When using a VPN, what's the one thing that you cannot hide from ISPs, Hackers, and the government? A - The fact that you're using a VPN, B - Your identity, C - Your Data?
A - The fact that you're using a VPN.