Exam "Digital Citizenship and Cyber Hygiene"- past Video Q's

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the devices is not connected to the Internet of Things? 1. An AM/FM radio without any bluetooth or Internet connection capabilities 2. Device that measures your physical activity and allows you to track your activity through a mobile app 3. A smart thermostat that allows you to remotely control your home's temperature through a mobile app 4. Digital baby monitor

1

Which of the Following is true about the internet of things? 1. The Internet of Things is the network of devices with the ability to connect and exchange data. 2. The Internet of Things increases our vulnerability to cyber attacks. 3. The Internet of Things is purely positive-there are no negative consequences to increased connectivity

1 and 2

Which of the following is not a characteristic of a credible source? 1. The author is not named on the website 2. The domain is .edu or .gov 5. Multiple scholarly sources are cited 4. The source is well-organized and follows rules of spelling and grammar

1.

The video described several different kinds of charts that we commonly use to visualize data. In which of the following would one of the charts described help to accomplish the accompanying task described? 1. You want to track the number of times you say "hello" today. 2. Your school wants to track how many people attend the football games over time throughout the school year. 3. You are trying to figure out what happens when different colors are mixed. 4. You need instructions on how to bake a cake.

2.

Which of the following statements is true about data visualizations? 1. Visualizing data has only been possible since computers have become widespread. 2. Visualizations take many forms, from tables to charts to images. 3. There is always one exact visualization that should be used to show a particular aspect of a dataset. 4. The only way to extract information from data is by using a visualization.

2.

Which of the following pieces of information would be safe to include in an online username? 1. School mascot 2. Favorite sport 3. Year of birth 4. City of residence

2. Favorite Sport

By checking the box on a privacy policy page, a company can legally use your data and information in all the ways disclosed, no matter what. 1. True. This is always the case. 2. True. Changing your settings does not affect the privacy policy. 3. False. It depends if the privacy policy allows you to opt in or out of sharing data. 4. False. Companies do not give you the option to update your settings.

3

By checking the box on a privacy policy page, a company can legally use your data and information in all the ways disclosed, even if you change your settings. 1. True. This is always the case. 2. True. Changing your settings does not affect the privacy policy. 3. False. It depends if the privacy policy allows you to opt in or out of sharing data. 4. False. Companies do not give you the option to update your settings.

3.

Which of the following is not a good practice for effective Internet searches? 1. Search for specific keywords that define your topic 2. Use quotation marks to search for exact phrases 3. Be general in your search query to get as many results possible 4. Use + or - to include or exclude different topics

3.

Which is not true about cybersecurity? 1. Recent data breaches have released personal information of hundreds of millions of people. 2. Cybersecurity is the protection of computer systems, networks, and data from digital attacks. 3. As we rely more on computing devices to store and send data, we increase our vulnerability to cyber attacks. 4. Cyber attacks can devastate large organizations, but individuals are largely unaffected.

4

Which of the following is an example of two factor authentication? 1. You are asked to factor a large prime number in order to gain access to sensitive data. 2. You are asked to reset your password every other time you enter a secure website. 3. After inputting your password, you are asked to enter it again. 4. After inputting your password, you receive a text message with a unique pin.

4.

What was the WannaCry ransomware attack?

A global malware attack that locked up files in the computer and demanded 300 bitcoin to fix the problem.

Hack def

A security hacker is someone who seeks to break through defenses and exploit weaknesses in a computer system or network.

A person's digital footprint consists of the following: I. Comments you leave II. Pictures you post III. Topics you search IV. Apps you use V. Music you download VI. Emails you send

All

Which of the following people can access your digital footprint? I. Teachers, colleges, and scholarship committees II. Potential employers III. Family, friends, and acquaintances

All

A privacy policy discloses: a. How a company uses your data b. How a company shares your data c. How a company gathers your data

All of the above

Victims of cyberbullying may experience which of the following? 1. Isolation 2. Low self-esteem 3. Depression

All of the above

Which of the following are best practices for having a secure password? a. Creating a password that is long in length b. Creating a password that has a combination of letters, numbers, and special characters c. Using a password manager

All of the above

There are several types of copyright licenses, some offering more protection than others:

All rights reserved Creator reserves all right (Most restrictive) Some rights reserved Creator may allow for things like reuse or modifications as long as they are cited as the creator Public domain Creator has dedicated the work to the public domain and waived all rights

How to judge source legitimacy

Author: Is there an author? What are their credentials? Date: How recently was this published? Sources: Are scholarly sources cited? Domain: Is the site .edu or .gov? (.edu and .gov are good, with .com you should be more cautious.) Site Design: Is the site well-designed? Writing Style: Does the site follow spelling and grammar rules?

Suppose you want to make a visualization that shows how many students bought certain quantities of candy from the vending machine during the month of September. Of the choices below, which chart would best convey this information to the person looking at the graph? A. Pie chart B. Histogram C. A map where the colors represent the number of candy bars bought D. Line chart

B. Histogram

Which of the following describes an instance of legal hacking? A. Looking for security risks on a product that is excluded from a bug bounty program. B. Penetration testing for a company C. Grey hat hacking D. Security hacking is never legal

B. Penetration testing for a company

Black Hat Hacker

Break into secure networks to destroy, modify, or steal data Break network functionality Hack for personal gain or to cause harm Criminal hackers who face serious legal consequences

In a cyberbullying situation there are the people who play what roles?

Bully (uses digital devices to harass and hurt somebody), Victim (is being cyberbullied), Bystanders (are aware of cyberbullying but don't intervene), and Upstanders (try to break the cycle of cyberbullying)

Which of the following lists the types of copyright license from most restrictive to least restrictive? A. Public Domain, All Rights Reserved, Some Rights Reserved B. Public Domain, Some Rights Reserved, All Rights Reserved C. All Rights Reserved, Some Rights Reserved, Public Domain D. All Rights Reserved, Public Domain, Some Rights Reserved

C.

What CIA Triad stand for?

Confidentiality, Integrity, and Availability

Cyberbullying: Permanent

Cyberbullying can contribute to the digital footprint of the victim and the bully

Cyberbullying can include? and is a ______

Cyberbullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone else; crime in many states

How can you be an upstander if you witness cyberbullying? A. Reach out to the victim-let them know that you care and encourage them to seek help B. Tell a teacher, parent, or counselor about the bullying C. Report bullying to the website admin D. All of the above

D. All of the above

Which of the following actions will help you avoid violation of copyright laws? A. Always cite sources B. Check the copyright to make sure it can be used by others without permission C. Use public domain media D. All of these answers

D. All of these answers

A person's digital footprint is: A. Public, but not usually permanent B. Only public to people whom a person shares things with, but what's there is permanent D. Public and permanent to anyone

D. Public and permanent to anyone

What is not true of white hat hackers? A. They contribute to robust security systems B. They use the same methods as black hat hackers C. They alert companies of security vulnerabilities D. They are breaking the law and are at risk of legal repercussions

D. They are breaking the law and are at risk of legal repercussions

Cyberbullying: Persistent

Digital devices allow constant communication, so victims don't have respite

Hacking Ethics & Legality Concluison

Don't break the law. Only hack with explicit permission If you aren't sure about the legality of your actions, stop and seek clarification There are very real consequences for illegal hacking, even if you don't mean any harm

True or False. The information about a particular person that exists on the Internet is a result of only a portion of their online activity. Some things don't matter or are not part of a person's digital footprint.

False

True or False: As long as you cite your source, you are free to use or share any kind of media you find on the Internet.

False

True or False: It is legal to practice hacking public websites as long as you are a student learning about cybersecurity.

False

True or false: The internet is a great place to socialize, and because it is completely online, everyone is safe.

False

Illegal Hacking Examples

Finding and exploiting vulnerabilities for personal gain "Hacktivism" (hacking to promote a political agenda or social change) Trying to find system vulnerabilities without permission (grey hat hacking) Breaking the rules of a bug bounty program

Grey Hat Hacker

Hack without permission--oftentimes illegally Once vulnerabilities are found, will contact the organization and request payment

What Hat Hacker

Have permission to hack a system Hired for penetration testing: Use same methods as black hats Find vulnerabilities before malicious attackers Contribute to robust security systems

Which of the following are ways that data is collected about you: I - Websites store data that tracks how you use the website II - Websites store cookies in your browser so that the next time you visit the website things like your profile login and recent activity are saved III - Some apps store geolocation information from your phone to track your location IV - Transaction data is stored by credit card companies when you purchase things with a credit card

I, II, III, and IV

Which of the following are safety guidelines when socializing online? I. Be wary when communicating with people you don't know in real life II. Don't disclose personal information-even if it doesn't seem important III. Don't have any social media accounts IV. Block/report if you are being harassed V. Don't send or receive any emails VI. Ask a trusted adult if you need help

I, II, IV, and VI

Which of the following statements are true about cyberbullying: 1. Cyberbullying uses electronic communication to bully a person. 2. Cyberbullying is a crime in many states. 3. Instances of cyberbullying do not affect the digital footprint of the victim. 4. Cyberbullying hurts real people even though we can't always see their reactions online.

I, II, and IV

Which of the following can help you to maintain your digital footprint? I. Using privacy settings to limit your exposure II. Posting long rants when you are angry about something III. Reviewing posts you are tagged in and taking action if needed IV. Googling yourself on a regular basis

I, III, and IV

What should you do if you are a victim of cyberbullying? I. Respond to the bully II. Keep a record of messages received (print or take screenshots) III. Reach out to parents, teachers, counselors, and school administrators IV. Block communication from the bully (if possible)

II, III, and IV

Consequences of Illegal Hacking

In the United States, a criminal hacker faces: Felony charges Prison time (up to 20 years) Fines (up to $15,000)

Alice is buying books from an online retail site, and she finds that she is able to change the price of a book from $19.99 to $1.99.

Integrity

Why is it important to learn about cybersecurity?

It's important to learn about cybersecurity so we know how to protect ourselves from hackers, malware, and phishing.

Copyright & Creative Credit Conclusion

Look for copyright licenses Follow copyright licenses Always cite sources Be respectful of copyright owners!

Why is it important to continuously conduct penetration testing for a strong security system?

Make sure that no hackers can get in, and find unfound vulnerabilities.

How does the Internet of Things positively effect our lives?

Makes our lives easier

If being bullied you should...

Not respond, keep a record, reach out to people you trust and can help, block (if possible), and report

What penetration testing?

Penetration testing is to find and exploit technical vulnerabilities, to improve technical security.

What are the risks to so much connectivity due to the Internet of Things?

People can hack and take control of your vehicle (locking doors, cutting off the brakes, taking control of the wheel) and cause a crash.

Why is Cyber Security Important?

People steal important information that can ruin peoples lives (identities, money with your own name, personal information, etc.)

Cyberbullying is

Persistent, Permanent, and Discreet

What is Cyber security?

Protection of computer systems, networks, and data from digital attacks.

(CIA Triad) Confidentiality def

Protection of information from people who are not authorized to view it.

How to be an Upstander

Reach out, Don't bully the bully back, Tell someone who can help, Stand up

How to make an effective internet search

Search for keywords that define your topic--be specific Question: Which US state produces the most solar energy? Keywords: United States solar energy production Use quotation marks to search for exact phrases. "solar energy" returns results that contain the exact phrase. Use "+" and "-" to narrow your search. "Solar energy" +USA returns results that contain "solar energy" AND USA "Solar energy" -jobs returns results that contain "solar energy" AND NOT jobs No space between +/- and keyword: -jobs not - jobs

How is information collected?

Surveys, Sensors, Transactional data from credit cards, Websites storing information about you, and Crowdsourcing data

Cyberbullying: Discreet

Teachers and parents can't see or overhear cyberbullying.

How does the issue of cybersecurity relate to the Internet of Things?

The Internet of Things makes our lives easier, but makes us more vulnerable to attacks.

What is a digital footprint?

The information about a particular person that exists on the internet as a result of their online activity.

What is data visualization?

The use of charts, graphs, or images to visualize complex data.

How to "Data Sanitize"

Throwing out data that is not well formatted Someone enters "$$" for their age when they should have entered a number Can't visualize $$ as a number, throw it out.

True or False: Cyberbullying can be persistent, permanent and discreet (meaning teachers and parents can't see or overhear cyberbullying).

True

Misleading Visualization in visual data

Truncated Y Axis: not starting the y axis from 0 Omitting data: leaving out data points to make a fake trend Breaking convention to trick the viewer Correlation does not imply causation!

When you are online you should use _______ ________ ______ so you don't regret anything while online.

USE COMMON SENSE!

How do we protect ourselves from cyber-attacks?

Update your computer software

Legal Hacking Examples

Working as a penetration tester Following the rules of a company's bug bounty program Hacking a site created explicitly as a teaching tool (hackthissite.org)

To keep yourself safe on the internet

a. Don't disclose personal information. b. Usernames should not contain personal information (full name, birthday, age) c. Be careful with information about your life, even it if feels unimportant (school mascot, schedule) d. If somebody is asking you for personal information online, stop communication. (Use common sense)

How to maintain a positive Digital Footprint

a. Use privacy settings to limit exposure b. Review posts you are tagged in and take action if needed c. Permanently delete old social media accounts you don't use d. Google yourself on a regular basis

(CIA Triad) Integrity def

aims at ensuring that information is protected from unauthorized or unintentional alteration.

(CIA Triad) Availability def

assurance that systems and data are accessible by authorized users when and where needed.

Felipe is trying to find information on wind power in Germany. Which of the following would be the most effective search query for this? a. wind +power b. "wind" +Germany c. "wind power" -Spain d. "wind power" +Germany

d

Which of the following describes a credible source? a. The author is not listed. b. There are no sources cited. c. The page is poorly designed and confusing to navigate. d. The domain is .edu.

d

If being bullied you should not...

forward messages back, and don't believe the bully!

Data Charts:

i. The Table is a great way to show precise data. ii. Pie charts are great for showing percentages of the whole. iii. A Line Chart is great for showing trends over time. iv. A Bar Chart is great for comparing different categories. v. A Histogram shows the frequency of events.

Whatever a person shares on the internet is ______ and ________.

public; permanent

What is cyberbullying?

the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.


Ensembles d'études connexes

Simple Interest, Tax, Tip, Discount & Commission, 7th Grade - Percent Problems, 7th Grade Percents

View Set

EES 101 Exam 3 Study Guide AKA my hell on earth

View Set

Chapter 12: Materials Requirement Planning (MRP) and Enterprise Resource Planning (ERP)

View Set

Chapter 11 - Developmental Theories

View Set