Online safety quiz
Which of the following is NOT considered a digital asset?
An image you do not have the right to use
A __________ attaches itself to a file or program, enabling it to spread from one computer to another.
Computer virus
Which type of identity theft occurs when a thief uses someone else's identity to commit a crime?
Criminal
How are digital assets and digital footprints related?
Digital assets create digital footprints
In order to protect your passwords, don't use easy-to-guess information, don't share your passwords, and NEVER change your passwords.
False
Protecting what is added to your digital footprint is important because potentially embarrassing information can remain on-line ___________.
Forever
_____________ is the act of breaking into a computer to steal information.
Hacking
A digital footprint is all of the information on-line about a person posted by that person or others, ____________.
Intentionally or unintentionally
Which of the following are ways to avoid Internet scams?
Never provide your SSN to a person or entity you do not know Know with whom you are dealing Keep your other personal information personal All of the above
Is "WS1979" a strong password?
No
A digital asset can contain textual content, images, and multimedia.
True
Email attachments, fictitious websites, pop-up ads, and spam are all ways malware can be shared.
True
The primary goal of an Internet scam is to gain access to someone's personal information or their finances.
True
A ___________ spreads from one machine to another, rapidly, without human action.
Worm
Julia receives an email from an unknown source. The subject of the email looks strange and it has an attachment. What should Julia do?
Delete the email
What type of identity theft occurs when a thief uses someone else's identity to gain medical treatment or commit insurance fraud?
Medical
Hiring managers and college admissions officers are some of the people who use social media and other Internet resources to research candidates for employment
True
Identity theft is when someone wrongfully obtains and uses another person's personal data, typically for economic gain.
True
Free Wi-Fi is typically offered on a(n) __________ network.
Unencrypted