True or False: Cybersecurity is only useful if you want to become a professional hacker.
False
Notes: Correct! Programming and computer science has many applications outside of being a professional programmer.
Which of the following most accurately describes the Internet of Things?
Malicious hackers intent on stealing confidential information like credit card numbers or email addresses
All of the websites that a person can currently access online
Internet service providers who make it possible to go online
The network of devices with the ability to connect and exchange data
The network of devices with the ability to connect and exchange data
True or false: The internet is a great place to socialize, and because it is completely online, everyone is safe.
True
False
False
True or False. The information about a particular person that exists on the Internet is a result of only a portion of their online activity. Some things don’t matter or are not part of a person’s digital footprint.
True
False
False
True or False: Cyberbullying can be persistent, permanent and discreet (meaning teachers and parents can’t see or overhear cyberbullying).
False
True
True
Which of the following is not true about cybersecurity?
Recent data breaches have released personal information of hundreds of millions of people.
Cybersecurity is the protection of computer systems, networks, and data from digital attacks.
As we rely more on computing devices to store and send data, we increase our vulnerability to cyber attacks.
Cyber attacks can devastate large organizations, but individuals are largely unaffected.
Cyber attacks can devastate large organizations, but individuals are largely unaffected.
Notes: Correct! This statement is not true. Individuals and small businesses should take necessary precautious to protect their data as well!
Which of the following devices is not a part of the Internet of Things?
A watch that allows you to measure and track your activity through a mobile app
A security system that lets you remotely monitor your home
A physical combination padlock for your gym locker
A car with a built-in navigation system
A physical combination padlock for your gym locker
What is the main fear that ransomware attacks center around?
Fear of hackers
Fear of the Internet
Fear of being spied on
Fear of losing important files
Fear of losing important files
A deceptive email is typically used in a phishing attack. Which of the following is most likely a legitimate email address?
jacob@homedepot23.com
nathaniel@paypal.info1.com
mikayla@applle.com
jamal@netflix.com
jamal@netflix.com
What should be the primary focus of keeping information secure?
Educating users on the dangers of phishing attempts
Encrypting all personal data
Ensuring the confidentiality, integrity, and availability of data
Implementing a strong password policy
Ensuring the confidentiality, integrity, and availability of data
Which of the following devices is not connected to the Internet of Things?
An AM/FM radio without any bluetooth or Internet connection capabilities
A wearable device that measures your physical activity and allows you to track your activity through a mobile app
A smart thermostat that allows you to remotely control your home’s temperature through a mobile app
A digital baby monitor that allows you to stream video and audio of your nursery from the Internet
An AM/FM radio without any bluetooth or Internet connection capabilities
Notes: Correct!
Alice is checking her grades on a school computer in the library, and she forgets to log out before she leaves. Bob gets on the computer after her, and he sees her grades for all of her classes.
Which part of the CIA triad was broken?
Confidentiality
Integrity
Availability
All of the above
Confidentiality
Sarah puts a lock on her diary so only she can read it. Her little brother breaks the lock and reads her diary.
Which part of the CIA triad was broken?
Confidentiality
Integrity
Availability
All of the above
Confidentiality
Spear-phishing is when hackers search for and use personal data to directly target a person in a phishing email. Of the following, which would provide the most credibility in a spear-phishing email?
Knowing your full name
Knowing your hobbies
Knowing a recent store that you shopped at
Knowing your address
Knowing a recent store that you shopped at
Which of the following are best practices for having a secure password?
Creating a password that is long in length
Creating a password that has a combination of letters, numbers, and special characters
Using a password manager
All of the above
All of the above
Which of the following is true about the Internet of Things?
I. The Internet of Things is the network of devices with the ability to connect and exchange data.
II. The Internet of Things increases our vulnerability to cyber attacks.
III. The Internet of Things is purely positive–there are no negative consequences to increased connectivity
I and II
Notes: Correct!
Which of the following statements are true?
A. There has been a decrease in the number of cyber attacks in the past decade.
B. Cybersecurity is the protection of computer systems, networks, and data from digital attacks.
C. Cyber attacks in the past few years have impacted individuals, governments, and organizations.
A only
B only
B and C
A, B and C
B and C
What does a ransomware hacker do when they gain access to a user’s system?
Encrypt important files
Delete key system data
Copy a users personal data
Move operating system data
Encrypt important files
Which of the following statements are true about cyberbullying:
I. Cyberbullying uses electronic communication to bully a person.
II. Cyberbullying is a crime in many states.
III. Instances of cyberbullying do not affect the digital footprint of the victim.
IV. Cyberbullying hurts real people even though we can’t always see their reactions online.
I and IV
II and III
I, II, and IV
All of the above
I, II, and IV
Felipe is trying to find information on wind power in Germany. Which of the following would be the most effective search query for this?
wind +power
"wind" +Germany
"wind power" -Spain
"wind power" +Germany
"wind power" +Germany
Which of the following is true about jobs in the field of cybersecurity?
There are a lot of unfilled positions in cybersecurity right now, but in the next few years all of those positions will be filled.
Right now there aren’t many unfilled cybersecurity positions, but there will be more in the next couple of years.
There are many unfilled cybersecurity positions right now, and there will be even more unfilled positions in the next couple of years.
There are too many qualified cybersecurity professionals. There are no unfilled positions now, and there won’t be any unfilled positions in the next few years.
There are many unfilled cybersecurity positions right now, and there will be even more unfilled positions in the next couple of years.
Cynthia discovers that she has the ability to modify the lunch menu posted on her school’s website. She edits the website so for lunch every day, it says “Green Eggs and Ham”.
Which part of the CIA triad was broken?
Confidentiality
Integrity
Availability
All of the above
Integrity
What is the core technology that allows digital devices to connect and transmit data with each other?
sensors
networks
smart phones
a global positioning sensor or GPS
networks
Which of the following can help you to maintain your digital footprint?
I. Using privacy settings to limit your exposure
II. Posting long rants when you are angry about something
III. Reviewing posts you are tagged in and taking action if needed
IV. Googling yourself on a regular basis
I and IV
I, II and III
I, III, and IV
All of the above.
I, III, and IV
Which of the following actions will help you avoid violation of copyright laws?
Always cite sources
Check the copyright to make sure it can be used by others without permission
Use public domain media
All of these answers
All of these answers