Best Practices
Security
Digital Life
Attacks
Misc
100

To protect your information and help you to remember passwords, use your social media account login information to log into another site. (True/False)

False

100

How does encryption work?

- - -

1. It scrambles the information until the key is used to unscramble it.

2. It protects data on your hard drive, but once you choose to send it to someone, it is no longer protected.

3. It is a key that you insert into your computer to unlock your saved files.

4. It is what happens when you download attachments from your email.


1. It scrambles the information until the key is used to unscramble it.

100

When you think about your typical day, which of the following tasks would NOT involve technology?

- - -

1. Running three miles with the dog.

2. Responding to your child's teacher's email.

3. Using an app to order your coffee.

4. Turning off your alarm on your phone. 

1. Running three miles with the dog.

100

A trojan is a malicious program that uses a computer network to replicate. (True/False)

False

A worm is a malicious program that uses a computer network to replicate.

100

How is the environment impacted by computers being thrown away in landfills?

- - -

1. The lead and mercury is seeping into the ground and water supply.

2. The e-waste is increasing because more people are choosing to recycle.

3. Data miners are digging up landfills looking for gold and platinum.

4. The cooper is creating fire dangers and explosive possibilities.

1. The lead and mercury is seeping into the ground and water supply.

200

Choose the strongest password.

- - - 

1. Test1test2test3

2. colorbluesky

3. Welcome123

4. H@veAGr3atDay!

4. H@veAGr3atDay!

200

All of the following are security features that can help locate a stolen phone EXCEPT ____.

- - -

1. A failed passcode, three times, will cause a picture of the thief to be taken and emailed to the owner of the phone. 

2. The phone can generate and alarm even if it is on mute. 

3. The owner can use remote wiping to retrace the thief's steps.

4. The current location of the phone can be pinpointed on a map through the phone's GPS.

3. The owner can use remote wiping to retrace the thief's steps.

200

Technology is used today in manufacturing, health care, and the transportation industry, but education has not yet embraced it. (True/False)

False

200

What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank? 

- - - 

1. encryption

2. dumpster diving

3. identity theft

4. phishing

4. phishing

200

How can you protect a computer from electrical spikes and surges? 

- - -

1. Use a cable lock.

2. Use a surge protector.

3. Unplug the computer when it is not in use.

4. Use an uninterruptible power supply.

2. Use a surge protector.

300

How can you protect your info when using social media?

- - - 

1. Accept friend requests from people you want to be friends with.

2. Have your security information marked public on your social media account.

3. Use the same password and username for your social media that you use for your online banking account.

4. Make sure you have your credit or debit card linked to your social media account.

1. Accept friend requests from people you want to be friends with.

300

Which of the following statements about browser security settings are true? (select all that apply)

- - - 

1. You can choose which sites run pop-ups.

2. You can deny cookies.

3. Your accumulated web history is stored forever.

4. Sites can be allowed or blocked from running scripts.

1. You can choose which sites run pop-ups.

2. You can deny cookies.

4. Sites can be allowed or blocked from running scripts.

300

What technology can be used by people with a hearing disability to listen to a narration?

- - - 

1. Read aloud technology

2. MIDI technology

3. Speech recognition

4. Computer-aided technology

3. Speech recognition

300

How can an online attacker use your online profile to gather information about you to steal your identity? 

- - - 

1. Use your posts to figure out answers to possible security questions.

2. Post a message that appears to be from a friend warning about a security breach and encouraging you to change your account information. 

3. Use your profile pictures to figure out where you are. 

4. Pose as a long lost relative to become one of your friends. 

1. Use your posts to figure out answers to possible security questions.

300

In which of the following situations would you find a data backup helpful? (select all that apply)

- - - 

1. if a data backup overwrites current data, so you can correct user error

2. during a natural disaster because a data backup provides a copy of previous data

3. when a slow internet connection is available

4. if there has been a software malfunction, because then a data backup can restore a previous version

1. if a data backup overwrites current data, so you can correct user error

2. during a natural disaster because a data backup provides a copy of previous data

4. if there has been a software malfunction, because then a data backup can restore a previous version

400

In terms of privacy, which of the following is a best practice? 

- - -

1. Saving your personal information as an email draft.

2. Posting your location on social media. 

3. Keeping your Social Security number hidden in a locked box in you home.

4. Throwing away old bank statements that are more than three months old. 

3. Keeping your Social Security number hidden in a locked box in you home.

400

Which is a first step to deter thieves from accessing your financial information? 

- - - 

1. Be alert to signs that may indicate unusual activity in an account.

2. Do not provide personal information over the phone or through email.

3. Follow up on calls regarding purchases that were not made. 

4. Review financial and billing statements each month carefully.


2. Do not provide personal information over the phone or through email.

400

Digital assistants like Siri, Cortana, and Alexa are mostly considered to be sophisticated and high-functioning. What technologies do they use to produce clear and accurate results? (select all that apply)

- - -

1. Synthesized speech

2. MIDI technology

3. Speech recognition

4. Artificial Intelligence

1. Synthesized speech

3. Speech recognition

4. Artificial Intelligence

400

How is a worm different from a Trojan?

- - - 

1. A worm gathers information and transmits to a ser, whereas a Trojan hides and then spreads through a network. 

2. A worm spreads through a network, whereas a Trojan hides inside another program.

3. A worm prevents a device from functioning until a ransom is paid, whereas a Trojan gathers information and transmits it to another device.  

4. A worm reproduces itself on the same computer, whereas a Trojan attempts to spread through the network. 

2. A worm spreads through a network, whereas a Trojan hides inside another program.

400

Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?

- - -

1.Repetitive strain

2. Technology addiction

3. Cyberbullying

4. Ergonomics

4. Ergonomics

500

Which of the following is a characteristic of a strong password? 

- - -

1. a short phrase

2. letter, numbers, and symbols

3. personal information

4. numbers in a series

2. letter, numbers, and symbols

500

Which of the following website features should make you question its security?

- - - 

1. "https in URL.

2. An icon that indicates a secure connection.

3. Absence of a lock icon in the browser window.

4. Requirement to sing in with a username and password. 

3. Absence of a lock icon in the browser window.

500

A video that is shared millions of times over social media in a short period of time is termed to be ____. 

- - - 

1. fake

2. concurrent

3. viral

4. original

3. viral

500

Why is it not safe to connect o public Wifi networks? (select all that apply)

- - - 

1. Because these networks are rarely protected.

2. Because the connection is often too slow. 

3. Because it can weaken your own Wifi wireless router. 

4. Because an attacker may have set up an evil twin.

1. Because these networks are rarely protected.

4. Because an attacker may have set up an evil twin.

500

Technology can lead to all of the following behavioral risks EXCEPT ____.

- - -

1. higher satisfaction with life

2. depression and anxiety

3. a sedentary lifestyle

4. social withdrawal

1. higher satisfaction with life