5.2.2 Quiz: Internet Security and Law
Which of the following is the strongest password?
8)oscysbydel%2
Which statement is true about biometrics as an authentication method?
Computer scientists are always trying to improve biometric authentication methods.
When should you change passwords?
Every couple of months or whenever you give it to someone else.
Computer identity theft differs from theft in the real world in what major way?
Identity theft can affect your credit without you knowing.
Many phone fraud scammers are especially cunning because they approach the target to try to sell _______.
Improved Computer Security Programs
Worms and trojan horses are examples of _______.
Malware
Which of the following is a category of authentication tools?
Something you have.
What is the LEAST effective step to keep young people safe from online predators?
Take away their computer and phone if you catch them in a chat room.
Why are many otherwise safety-conscious people victims of internet crime?
They have not been educated in safe digital best practices.
What is the major difference between cyber vandalism and online piracy?
Vandals went to disrupt and showoff a viewpoint; the goal of online piracy is to steal money.