Online safety quiz

Ace your homework & exams now with Quizwiz!

Which of the following is NOT considered a digital asset?

An image you do not have the right to use

A __________ attaches itself to a file or program, enabling it to spread from one computer to another.

Computer virus

Which type of identity theft occurs when a thief uses someone else's identity to commit a crime?

Criminal

Julia receives an email from an unknown source. The subject of the email looks strange and it has an attachment. What should Julia do?

Delete the email

How are digital assets and digital footprints related?

Digital assets create digital footprints

In order to protect your passwords, don't use easy-to-guess information, don't share your passwords, and NEVER change your passwords.

False

Protecting what is added to your digital footprint is important because potentially embarrassing information can remain on-line ___________.

Forever

_____________ is the act of breaking into a computer to steal information.

Hacking

A digital footprint is all of the information on-line about a person posted by that person or others, ____________.

Intentionally or unintentionally

What type of identity theft occurs when a thief uses someone else's identity to gain medical treatment or commit insurance fraud?

Medical

Which of the following are ways to avoid Internet scams?

Never provide your SSN to a person or entity you do not know Know with whom you are dealing Keep your other personal information personal All of the above

Is "WS1979" a strong password?

No

A digital asset can contain textual content, images, and multimedia.

True

Email attachments, fictitious websites, pop-up ads, and spam are all ways malware can be shared.

True

Hiring managers and college admissions officers are some of the people who use social media and other Internet resources to research candidates for employment

True

Identity theft is when someone wrongfully obtains and uses another person's personal data, typically for economic gain.

True

The primary goal of an Internet scam is to gain access to someone's personal information or their finances.

True

Free Wi-Fi is typically offered on a(n) __________ network.

Unencrypted

A ___________ spreads from one machine to another, rapidly, without human action.

Worm


Related study sets

Chapter 45: Management of Patients with Oral and Esophageal Disorders, Chapter 44: Digestive and Gastrointestinal Treatment Modalities, Chapter 46: Management of Patients with Gastric and Duodenal Disorders, Chapter 47: Management of Patients With In...

View Set

EMT Class - Ch 7 quiz: Life span Development

View Set

Wiley Ch 10 - Muscular Tissue (complete)

View Set

Organizational Behavior Final Exam

View Set

Money, Inflation, Quantity Theory

View Set