Enabling two-factor authentication (2FA) significantly improves the security of online accounts.
True
A __________ is a type of malicious software designed to block access to a computer system until a sum of money is paid.
ransomware
Sarah received an email from her bank asking her to update her account information by clicking a link, but the email was actually from a cybercriminal.
Sarah is a victim of a phishing attack.
Which of the following is a common method used to protect against phishing attacks?
D) Verifying the sender’s email address and not clicking on suspicious links
Antivirus software alone can protect you from all types of cyber threats.
False. While antivirus software is an important layer of defense, it is not foolproof and should be used in conjunction with other security measures like firewalls, regular software updates, and safe browsing practices.
The process of scrambling data to prevent unauthorized access is called __________.
encryption
Tom noticed that his online banking account showed transactions he did not make after he connected to a public Wi-Fi at a coffee shop.
Tom has experienced a man-in-the-middle attack.
What is the primary purpose of a firewall?
B) To monitor and control incoming and outgoing network traffic
Phishing is a technique used by cybercriminals to trick individuals into revealing personal information through deceptive emails or websites.
True. Phishing involves fraudulent attempts, typically via email, to steal personal information by pretending to be a trustworthy entity.
__________ is a practice where a user is required to present two different types of evidence to verify their identity
Two-factor authentication (2FA)
Lisa downloaded a free software program, and now her files are encrypted and she is being asked to pay money to get them back.
Lisa's computer is infected with ransomware.
Which type of malware is designed to replicate itself and spread to other computers?
C) Worm
Keeping your software and operating system up to date can help protect your computer from security vulnerabilities.
True. Regular updates and patches address known vulnerabilities and help protect your system from being exploited by cybercriminals.
A __________ is a software application or hardware device that records every keystroke made by a user, typically without their knowledge.
keylogger
After clicking on an advertisement, Mike's browser started redirecting him to unwanted websites and displaying pop-up ads.
Mike's computer is infected with adware.
What does the term "malware" refer to? A.
A hardware component
B. Malicious software
C. An email scam
D. A type of web browser
B. Malicious software
Public Wi-Fi networks are safe to use for online banking and shopping as long as they are password-protected.
False. Public Wi-Fi networks, even if password-protected, can be risky as they are often less secure and more susceptible to attacks like man-in-the-middle attacks. It's safer to use a secure, private network or a VPN for sensitive transactions.
__________ is the unauthorized copying, transfer, or retrieval of data from a system or network.
Data exfiltration
Emma found out that someone has been using her personal information to open credit card accounts in her name without her knowledge.
Emma is a victim of identity theft.
Which of the following is the best practice for creating a strong password?
C) Combining uppercase letters, lowercase letters, numbers, and special characters