Online Safety
Device Security
Cyber attacks
To Catch a Thief
Lucy in the sky
100

You post a picture on social media of you and your best friend.  She is not comfortable with it and you agree to remove it.  Will this ensure that no one else sees the picture?

No. Anything posted on the internet is virtually impossible to remove it from circulation.  There is no guarantee that others have not already seen it and/or downloaded it to their machines. 

100

A scammer creates a fake email and sends it to thousands of people, hoping some of them will click on a link and give up their personal information.  What is this type of attack called?

Phishing - a type of social engineering that often manipulates human impulses, such as greed, fear or the desire to help others.

100

You are just about to enter the bank when you spot a flash drive on the ground.  Do you: A- Leave it there, B- Take it home and use it, C- Format it and run a virus scan on it before using it?

Leave it there. Actually dispose of it in the trash. They can infect your computer as soon as they are connected to the USB port. 
100

A person who uses computers to gain unauthorized access to data.

A hacker?

100

Over 90% of successful cyberattacks start as phishing emails.  True or False? 

True

200

I can always trust emails and attachments I get from friends? True or False

False - New programs and viruses can send out emails to everyone in your friends inbox without their knowledge or consent.

200

If a public wi-fi network requires a password to access, it is generally safe to use that network for sensitive activities such as online banking. True or false? 

False - When you use a public network, your device and traffic are vulnerable to anyone who is in the same hotspot or the hotspot owner. 

200
A program installed on a user's device which tracks the user's every keystroke on that device. A - Quid pro Quo, B - Key Logger, C - Traffic intercept, D - Baiting.

B- Key Logger

200

Creating a fake facebook page for someone you know, or for someone you don't even know, is illegal.  True or False?

True - impersonating someone else online is one form of identity theft. Penalties can be as high as $100,000 fine plus a minimum of ten years in prison. 

200

Your office computer has been hacked; What do you do next? A - Restart your computer, B - Continue working until IT tells you what to do, C - Disconnect the computer from the internet and contact IT, D - Force shutdown your machine and leave it alone overnight?

C - disconnect the computer from the internet and contact IT.

300

You don't have to worry when you visit your favorite sites, like Facebook and gaming sites, because they are safe from spyware, malware and other threats.  True or False?

False - Trusted sites can be safer, however what you do on those sites - such as clicking on posts with links or using apps- can put you at risk.

300

Turning off the GPS function of your smartphone prevents any tracking of your phone's location.  True or False?

False - a study found that a device's time zone and information from it's sensors can be combined with public information like maps to estimate your location. 

300

What is the weakest link in cybersecurity? A - Weak encryption, B - Humans, C - Short passwords?

B- Humans

300

Where sensitive, protected or confidential data has been potentially viewed, stolen or used by an authorized individual.

A data breach?

300

Which one of these things is most effective for maintaining your digital privacy? A - Unsubscribing from all spam emails, B - Covering your computer's front-facing camera, C - Not sharing personal information on social media? 

C - not sharing personal information on social media.

400

Malware is a type of software designed to cause viruses. True or false?

True - malware is designed to cause damage or disruption to a computer system or to use a computer to send spam, distribute malware or launch an attack on other computers.

400

Most common way computers can get infected by computer viruses.

Opening attachments or links from unknown or spoofed emails?

400

A group of computers that is networked together and used by hackers to steal information is called ? A.- Botnet, B.- Rootkit, C.- DDoS, D.- Operating System, E.- Don't know?

Botnet

400

The amount of reported covid fraud losses by Americans from January till July 7th.  A - $500 thousand, B- $38 million, C - $77 million, D - $2 billion

C - $77 Million
400

Which part of your car is the most vulnerable to hacking? A- Cruise Control, B - Entertainment System, C - Wireless key fob?

B - Entertainment system

500

When it comes to online shopping, you can safely shop from any site. True or false?

False - you should always shop from trusted and well-known websites. When banking or shopping, check to be sure the site has security enabled.  Look for web addresses with "https://" instead of "http://"

500

If you don't protect the financial data used in commercial transactions on mobile devices, you could be subject to a $10,000 fine.  True or False? 

True - The Gramm-Leach-Bliley Act(GLBA) requires that personally identifiable financial information (PIFI) be secured at all times.  

500

Criminals access someone's computer and encrypt the user's personal files and data.  The user is unable to access this data unless they pay the criminals to decrypt the files.  This practice is called?

Ransomware

500

Holds a computer or data hostage until a fee is paid

Ransomware?

500

When using a VPN, what's the one thing that you cannot hide from ISPs, Hackers, and the government? A - The fact that you're using a VPN, B - Your identity, C - Your Data?

A - The fact that you're using a VPN.

M
e
n
u