What does VPN stand for
Virtual Private Network
VM's are referred to as a "sandbox". It is essentially a computer inside of a computer. What does VM stand for
Virtual Machine
If a service is free____
Then you are the product
Criminal activities carried out by means of computers or the internet
Cyber Crimes
Most used mobile operating system of 2023
Android
What information on a digital image can be used against you
Meta/Exif-data
Daily Double #2!
1980s
The first antivirus software, known as "Elk Cloner," was created in 1982 by a high school student named Rich Skrenta.
What is the term for a security measure that verifies the identity of a user by combining two or more different authentication factors?
Two Factor Authentication
This is the number 1 type of cyber crime.
Phishing
What is the most common cyber threat?
A. Old Technology
B. Weak Password
C. Human Error
C. Human Error
When choosing a password, what are 2 things to avoid
keyboard runs
family or pet names
default password
repeated passwords
VPN services provide an encrypted tunnel for data to move through the internet. Does this encrypted tunnel also protect from viruses over the internet
No
Items in your shopping cart, your log-in name or site preferences are all examples of what?
First Party Cookies
A form of cybercrime that involves hackers registering domains with deliberately misspelled names of well-known websites.
Typosquatting
Daily Double #1!
Zero Day Attack
The CIA Triade is a guiding model in information security. What does the "I" stand for
Integrity
Any representation of information that permits the identity of an individual to whom the information applies to be reasonably inferred by either direct or indirect means.
PII - Personal Identifiable Information
Instead of Incognito Mode or Private Windows, what is a better solution for browsing obfuscation?
VPN or Changing DNS
What is a computer network?
A. Internet Service Provider
B. A Quantum Computer
C. Computer/Devices That Are Connected Together
D. Fiber Optic Cables
C
Due to an outage earlier this year, AT&T has offered to reimburse customers for the inconvenience. How much money do they plan to give each customer?
A. $50
B. $5
C. $55
D. $15
B. $5
The more security the less ________
Usability
VPN's provide a secure tunnel across the internet
Firewall's filter content coming into and leaving your computer.
What device is used to to mitigate the use of malicious USB/Thumb Drives?
USB Condom/Data Blocker
_______ are created and placed by someone other than the owner of the website you're visiting to track consumers across the internet.
Third Party Cookies
The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes is what?
Social Engineering
This City is suing a handful of social media networks, alleging their platforms’ designs exploit young users’ mental health and cost the city $100 million in related health programs and services each year.
New York City