Which type of online threat uses communications claiming to be from a legitimate source to trick you
into giving personal information?
c. Phishing
1/16
| Term | Definition |
|---|---|
Which type of online threat uses communications claiming to be from a legitimate source to trick you
into giving personal information? | c. Phishing |
Claire downloaded a photo editing app. The next day, she found out her email account had been
hacked. Which of the following is the most likely cause? | d. Trojan |
As Amaya is leaving the office cafeteria, she notices a USB drive on the floor. She picks it up and sees
it is labeled with a department number only. When she returns to her desk, she plugs the USB drive into
her computer to see if she can determine the owner. This is an example of _______________, a social
engineering tactic. | a. baiting |
Any time you join a network, you open your system up to possible connections from other systems
participating on the same network. Which of the following statements are TRUE about using wireless
public connections? | d. It is best to use a VPN while using a wireless public connection
|
When using a public computer, which two of the following actions should you take to ensure your
safety? | a. Log out of online accounts
b. Clear the browser cache and cookies |
Nancy is being required to create a strong password for an online account at work. Which of the
following is the strongest password? | d. Y3ll0w$ ubm@rin3 |
Ariel needs to reset the password on her Amazon account. Using the image below as reference, which
option should she use to reset her password?
| a. Need help? |
Which option shown in the image below is used to lock a Windows 10 computer? | a. Option 1 |
To protect yourself from cybercriminals, which three types of data should be regularly cleared from
your web browser? Select three. | a. Cached files
b. Cookies
e. History |
Most smart devices allow you to disable or limit navigation tracking by changing the device’s
___________ settings. | b. location |
Which of the following actions do NOT have the potential to reveal your location to others? Select
the two options that apply. | b. Liking an artist’s website
f. Completing an online form |
Elias is doing research for a project in his school’s computer lab. When he takes a break, he checks
his personal email account and logs into one of his social media accounts. What should Elias do before
he logs off the lab computer to protect his information from the next user? | c. Clear browsing data |
All of the following statements regarding private (or incognito) browsing mode are true EXCEPT
_________________________. | d. your computer login is not required |
Cyberbullying takes place through email, social media, instant messaging, text messaging and any
other digital device, web site or app. Which of the following is NOT an example of cyberbullying? | d. Disagreeing with another person’s opinion |
Which three of the following options are considered physical issues related to prolonged computer
use? | a. Repetitive Stress Injuries
d. Eyestrain and Headaches
e. Muscular Issues |
From the list below, select the three items that likely contribute to vision issues when using
computer devices | a. Inadequate monitor resolution
b. Bright light coming in from the side of your screen
d. Screen flickering or refresh rate |