True/False
Definitions
Applications
100

Impersonation is when a person pretends to be someone they are not.

True

100

What is impersonation?

Impersonation is when a person pretends to be someone they are not.

100

If you fear your identity has been breached or stolen, what would you do?

Tell someone of authority.

200

Identity theft is a type of crime in which you take your friend's phone without their permission.

False. Identity theft is a type of crime in which your private information is stolen and used for criminal activity.

200

What is identity theft? 

Identity theft is defined as a type of crime in which your private information is stolen and used for criminal activity.

200

Who performed at the 2025 Superbowl halftime show? 

The GOAT!!!

300

It is not important to always be aware of your cybersecurity when you are online.

False.

300

What is a cybersecurity risk?

A cybersecurity risk is defined as potential threats to a person's or an organization's digital systems or accounts.

300

What are some of the potential impacts of someone impersonating you online?

Others might believe they were involved in unethical behavior.

Your reputation could be damaged.

It might take some time to prove your innocence.

The impersonator could use your information to create other accounts.

The impersonator could use your identity to scam people.


400


In the "Unsecured Account Dilemma" someone accessed Morgan's accounts and pretended to be her.

True. In the "Unsecured Account Dilemma," someone accessed Morgan's accounts and pretended to be her. This person used Morgan's email to send offensive memes about teachers to other students, which led to consequences for Morgan.

400

Among the four types of AI, name one.

Reactive machines

Limited memory

Theory of mind

Self-awareness

400

What would you do if your password has been compromised?

Change it!

500

A cybersecurity risk are potential threats to a person's or an organization's digital systems or accounts.

True

500

What is a 2-factor authentication?

Two-factor authentication (2FA) is a security method that requires users to provide two separate pieces of identification to access an online account, typically a password (something you know) and a code sent to your phone or another device (something you have).

500

What are some tips for practicing cybersecurity?


Never share your login information.

Create strong passwords or use a password manager.

Enable 2-factor authentication on all the apps and websites you use.

Make sure you log off your accounts after using public or shared devices.

M
e
n
u