Cyber security Unit 2 Review
Which of the following represents an example of a special character? 0 & G s
&
White Hat Hacking
A computer security specialist who breaks into protected systems and networks to test and assess their security.
Which of the following people can access your digital footprint? A. Teachers, colleges, and scholarship committees B. Potential employers C. Family, friends, and acquaintances A only A and B only C only A,B, and C
A, B, and C
Anne Smith is creating a screen name for her video game account. To ensure personal safety, which is the best screen name choice of the following? Her personal information is as follows: Name: Anne Smith Birthday: 12/13/2001 Address: 465 Marbury Lane, Chicago, IL 60603 ASmith2001 AnnieSGamer121301 AnneS60603 ASGamer12 ASChicago01
ASGamer12
Black Hat Hacking
Attempting to find computer security vulnerabilities and exploit them for personal/financial gain or other malicious reasons.
Which instances are considered illegal hacking? A. White hat hacking B. Hacktivism C. Penetration testing D. Bug bounty program E. Hacking just for fun All choices shown are illegal. B, C, D, and E B and E C, D, and E
B and E
What should you do if you are a victim of cyberbullying? A. Respond to the bully B. Keep a record of messages received (print or take screenshots) C. Reach out to parents, teachers, counselors, and school administrators D. Block communication from the bully (if possible) A only A, B, C and D B, C, and D B and C
B, C, and D
You purchased a new smartphone that can accept a PIN of up to six characters. For maximum security, what should you do? Use a four character PIN because it's easier to remember. Change your PIN to a new six-character PIN. Repeat the last character of your old four-character PIN to create a new six-character PIN. Disable encryption.
Change your PIN to a new six-character PIN.
By checking the box on a privacy policy page, a company can legally use your data and information in all the ways disclosed, even if you change your settings. True. This is always the case. True. Changing your settings does not affect privacy policy. False. It depends if the privacy policy allows you to opt-in or out of sharing data. False. Companies do not give you the option to update your settings.
False. It depends if the privacy policy allows you to opt in or out of sharing data.
Which of the following pieces of information would be safe to include in an online username? School mascot Favorite sport Year of birth City of residence
Favorite sport
Data Privacy
How a company uses your data.
Privacy Policy
Legal document outlining how a company can collect and use your data.
You have asked your users to avoid using passwords that use letters only. Which of the following policies would help enforce this? Password complexity requirements Enforce password history Minimum password length Maximum password age.
Password complexity requirements
Data Security
Protecting your data online.
A person's digital footprint is: Public, but not usually permanent Only public to people whom a person shares things with, but what's there is permanent Public and permanent to anyone Not permanent if you are under the age of 18
Public and permanent to anyone
https
Secure data transfer protocol when on the internet.
Digital Footprint
The information about a particular person that exists on the Internet as a result of their online activity.
Cyberbullying
The use of electronic communication to bully a person.
What is not true of white hat hackers? They contribute to robust security systems They use the same methods as black hat hackers They alert companies of security vulnerabilities They are breaking the law and are at risk of legal repercussions
They are breaking the law and are at risk of legal repercussions
How can you be an upstander if you witness cyberbullying? Reach out to the victim and let them know that you care and encourage them to seek help. Tell a teacher, parent, or counselor about the bullying. Report bullying to the website admin. All of these.
all of these
It's time to change passwords again and you don't feel like entering a brand-new password. You use an old password you used last year, but it is rejected. What policy is most likely preventing you from reusing it? Password complexity Password history Password expiration Maximum attempts
password history