Level 1 Lesson 7

Created by Bradley Conrad

Which type of online threat uses communications claiming to be from a legitimate source to trick you into giving personal information?
c. Phishing

1/16

TermDefinition
Which type of online threat uses communications claiming to be from a legitimate source to trick you into giving personal information?
c. Phishing
Claire downloaded a photo editing app. The next day, she found out her email account had been hacked. Which of the following is the most likely cause?
d. Trojan
As Amaya is leaving the office cafeteria, she notices a USB drive on the floor. She picks it up and sees it is labeled with a department number only. When she returns to her desk, she plugs the USB drive into her computer to see if she can determine the owner. This is an example of _______________, a social engineering tactic.
a. baiting
Any time you join a network, you open your system up to possible connections from other systems participating on the same network. Which of the following statements are TRUE about using wireless public connections?
d. It is best to use a VPN while using a wireless public connection
When using a public computer, which two of the following actions should you take to ensure your safety?
a. Log out of online accounts b. Clear the browser cache and cookies
Nancy is being required to create a strong password for an online account at work. Which of the following is the strongest password?
d. Y3ll0w$ ubm@rin3
Ariel needs to reset the password on her Amazon account. Using the image below as reference, which option should she use to reset her password?
a. Need help?
Which option shown in the image below is used to lock a Windows 10 computer?
a. Option 1
To protect yourself from cybercriminals, which three types of data should be regularly cleared from your web browser? Select three.
a. Cached files b. Cookies e. History
Most smart devices allow you to disable or limit navigation tracking by changing the device’s ___________ settings.
b. location
Which of the following actions do NOT have the potential to reveal your location to others? Select the two options that apply.
b. Liking an artist’s website f. Completing an online form
Elias is doing research for a project in his school’s computer lab. When he takes a break, he checks his personal email account and logs into one of his social media accounts. What should Elias do before he logs off the lab computer to protect his information from the next user?
c. Clear browsing data
All of the following statements regarding private (or incognito) browsing mode are true EXCEPT _________________________.
d. your computer login is not required
Cyberbullying takes place through email, social media, instant messaging, text messaging and any other digital device, web site or app. Which of the following is NOT an example of cyberbullying?
d. Disagreeing with another person’s opinion
Which three of the following options are considered physical issues related to prolonged computer use?
a. Repetitive Stress Injuries d. Eyestrain and Headaches e. Muscular Issues
From the list below, select the three items that likely contribute to vision issues when using computer devices
a. Inadequate monitor resolution b. Bright light coming in from the side of your screen d. Screen flickering or refresh rate