Digital Footprint & Reputation
Privacy & Security
More Privacy & Security
Information Literacy
Creative Credit & Copyright
Hacking Ethics
100

What are 3 examples of things in a digital footprint?

Emails, comments, pictures, posts, searches, app use, history, purchases, etc.

100

The 's' in https:// stands for...

Secure

100

"Secure by design" is a preventative or reactive measure against cybersecurity breaches?

Preventative

100

Using an online search engine, how would you group the words ANOTHER ONE BITES THE DUST into a single search term?

Use quotation marks:

"ANOTHER ONE BITES THE DUST"

100

True or False: Distributing copyrighted materials over file-sharing networks is a violation of the law.

True

100

What are the three major types of hackers?

White hat, black hat, and grey hat

200

Fill in the blank. Your digital footprint is always ____.

growing

200

What is 2-factor authentication?

A login process that requires 2 pieces of information

200

"Security by design" means companies address security risks and concerns when?

At the beginning of a project

200

Using an online search engine, how do you search for hats but exclude cowboy hats from the results?

Use a minus sign (-):

hats -cowboy

200

What is copyright?

A form of protection for intellectual property, usually applying to artistic works

200

Which of the following describes an instance of legal hacking?

A) Looking for security risks on a product that is excluded from a bug bounty program.

B) Penetration testing for a company

C) Grey hat hacking

D) Security hacking is never legal

B

300

Who looks at your digital footprint?

Schools, colleges, employers, friends, family, the list goes on

300

Apps must ask for ____ to access and use hardware (camera, mic) and files.

Permission

300

Fill in the blank. A privacy policy discloses how a company u____, s____, and g____ your data. (First letters given as hints)

USES, SHARES, and GATHERS

300

Fill in the blanks. Information literacy is having the ability to ____, ____, and ____ information effectively.

FIND, EVALUATE, and USE

300

Write the 3 types of copyright licenses from most restrictive to least restrictive.

1 - All Rights Reserved

2 - Some Rights Reserved

3 - Public Domain

300

What is NOT true of white hat hackers?

A) They contribute to robust security systems

B) They use the same methods as black hat hackers

C) They alert companies of security vulnerabilities

D) They are breaking the law and are at risk of legal repercussions

D

400

What happens when you delete something?

The storage directory marks the place where it is saved as "empty" or free to be rewritten, but the actual data remains. Any shared content that is deleted is only removed from your access but still exists on servers.

400

What is phishing?

Method to gather personal info; uses deceptive emails and websites

400

Write as many ways to make a strong password as possible.

8+ characters; capitals + lowercase; mix letters, numbers, & symbols; different passwords for different accounts; etc.

400

Give 2 examples of ways advertisers must disclose (label or announce) sponsored content (ads).

VERBALLY: YouTube creator says "this video is sponsored by..."

VISUALLY: Label on search result or under video title

400

When determining Fair Use, group the following into relevant and irrelevant factors to consider? Be ready to justify your answers.

A) Creativity of the secondary work

B) Platform/distributor of the original work

C) Degrees & certifications held by the original author

D) Financial impact of the secondary work on the original work

Relevant: D

Irrelevant: C

Arguable: A, B

400

What is "hacktivism" and is it legal?

Hacking to promote a political agenda or social change. It is illegal.

2147483647

What are 4 ways you can maintain your digital footprint?

Privacy settings, review content before posting, delete old accounts, Google yourself, be smart when using the internet, etc.
2147483647

Which of the following is/are good ways to store passwords? Be prepared to justify your answers.

A) In an unencrypted text file

B) On a piece of paper

C) Use a password manager

D) Use "Login with Google"

E) Reset your password everytime (use "Forgot your password")

Good: B,C,D

Bad: A,E

Answers may vary depending on justifications

2147483647

1) How does Google get info from you?

2) What info does Google collect?

3) What is Google's reasoning for collecting your personal info?

1) Monitoring app, browser, & device usage & interaction

2) Search terms, browsing activity & history, purchases, people with whom you communicate/share content, location, device data & settings

3) Maintain & improve Google apps & services, make new services, personalize, measure performance, communicate, protect users

2147483647

List 5 things to look for when judging a source's legitimacy and credibility. (100 pts per item)

Author, date, sources, domain, site design, writing style

2147483647

When determining if something is Fair Use, four factors can be used. Fill in the blanks with either "original" or "secondary"

1) Purpose of the ____ work

2) Nature of the ____ work

3) Amount (or portion) of the ____ work used

4) Effect of the ____ work on value of the ____

1) SECONDARY

2) ORIGINAL

3) ORIGINAL

4) SECONDARY ... ORIGINAL

2147483647

What is a "Bug Bounty" initiative?

Companies pay individuals to find and report vulnerabilities. This strengthens their security.

M
e
n
u