Information Privacy

¡Supera tus tareas y exámenes ahora con Quizwiz!

A.

One of the main goals of malware is to A. Discover which websites you visit B. Prevent you from visiting any illegal websites C. Report illegal online activity to the police D. Make online shopping more convenient

C.

The fact that even shady websites have freely available privacy policies suggests that A. Privacy policies leave out important information B. All privacy policies are exactly the same C. Most people don't take the time to read privacy policies D. Privacy Policies are against the law

A.

What can you infer from the fact that scams and other illegal behavior are so common on the internet A. There are no laws that regulate the internet B. Online criminals often use clever tactics to avoid detection C. Law enforcement officials are not aware of how much online crime there is D. Most Internet users are criminals

D.

What makes phishing attacks so easy to fall for A. They happen infrequently B. They only target adults C. They are relatively harmless D. They use messages that look official

D.

What type of personal information is it okay to share with someone you don't know? A. Your name and telephone number only B. Your email address only, if it doesn't include your name C. Minor details like the name of your school, and what your parents do for a living D. You should never share ANY personal information with someone you don't know

C.

Which of the following might be part of a site's privacy policy A. A software program that protects against spam and malware B. Downloadable games and apps C. A promise that sites won't sell your information to other people D. Information about how to acquire anti-virus software

B.

Which of these is an example of a spam? A. A downloadable game that contains hidden software B. An email message advertising a product you don't want C. A harmful program that destroys your hard drive D. An email joke forwarded to you by your Aunt Gladys

B.

Why would an identity thief most likely want to steal your information A. To imitate you in chat rooms and on message boards B. To access your bank accounts, credit cards, and other financial resources C. To send you emails advertising stuff you'd never want D. To send viruses out from your email account

D.

You need to create a password for an app. What advice should you follow A. Use only numbers B. Include your name C. Use your email password D. Make it hard to guess

B.

Your contact list for a social network should exclude which of the following A. A family member B. A stranger C. A classmate D. A friend from a summer camp


Conjuntos de estudio relacionados

Marketing 301 Chapter 12 Questions

View Set

Unit 10: Human Health and Air Pollution

View Set

Ch 43: Employment Discrimination

View Set