1
2
3
4
100

Lack of awareness of your surroundings is one of signs of digital___

distraction

100

What is a risk?

Any possibility that something might occur resulting in an injury or a loss

100

what is a digital security risk?

any event or action that could cause a loss of or damage to computer.

100

You can help avoid computer-related injuries with?

proper furniture, better posture and good working habits.

200

Social engineering is a category of attack that?

attempts to trick the victim into giving valuable info to the attacker

200

State-sponsored attackers are employed by the government to?

Launch computer attacks against their enemies through nation-state actors

200

Types of digital security risks include threats to our? Name at least one.

Information, physical health, mental health

200

What are the 5 stages of cyber security?

identification, protection, detection, response, and recovery

300

Kofi has been using an e-reader, but it is getting old. He wants a device that is similar in size and has a touch screen. Which would be the best fit for Kofi?

notebook, digital media player, or tablet?

A tablet

300

What is the process of shifting through big data to find the important questions that will yield fruitful results?

Data Mining

300

What is hazard and risk in computer?

a hazard might be an unpatched software vulnerability or a phishing email

300

What are the 4 D's of cyber security?

Deter, Detect, Delay, and Defend

400

An individual who threatened to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organizations net work is called..?

A Cyber extortionist

400

Any illegal act involving the use of a computer or related devices is generally referred to as?

computer crime

400

Which are some risks when using the computer?  (Physical pain)

back, neck and shoulder pains, headache, eye strain and overuse injuries of the arms and hands.

400

What are the most common types of computer risks?

malware infections, phishing attacks, weak passwords, unpatched software vulnerabilities, and social engineering

M
e
n
u