Unit 1 - Quiz: Identity ThEFT And Internet Safety

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By KatyaM
K
KatyaM
Community Contributor
Quizzes Created: 1 | Total Attempts: 427
Questions: 9 | Attempts: 427

SettingsSettingsSettings
Unit 1 - Quiz: Identity Theft And Internet Safety - Quiz

Let's recap what you learned in UNIT 1 about safe Internet practices and personal information protection online.


Questions and Answers
  • 1. 

    Phishing is:

    • A.

      An online sporting event

    • B.

      An online con game tricking people into divulging sensitive information

    • C.

      A form of identity fraud

    Correct Answer
    B. An online con game tricking people into divulging sensitive information
    Explanation
    Phishing is an online con game that tricks people into divulging sensitive information. This involves the use of deceptive tactics, such as creating fake websites or sending fraudulent emails, to trick individuals into revealing personal or financial information. The goal of phishing is to steal sensitive data, such as login credentials or credit card details, which can then be used for fraudulent purposes. It is a form of identity fraud that exploits the trust and vulnerability of unsuspecting victims in order to gain unauthorized access to their personal information.

    Rate this question:

  • 2. 

    In a phishing scam Identity thieves mainly gather information from users by extending bait in form of a legitimate-looking email leading users to a fake web site that requires users to proivde sensitive information:

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    In a phishing scam, identity thieves use a tactic of sending emails that appear to be legitimate in order to deceive users. These emails often contain links to fake websites that are designed to look like the real ones. Once users are directed to these fake websites, they are prompted to provide sensitive information, such as passwords, credit card details, or personal information. This information is then collected by the identity thieves, who can use it for fraudulent purposes. Therefore, the statement "true" is correct as phishing scams indeed involve gathering information from users through bait emails and fake websites.

    Rate this question:

  • 3. 

    Signs of a potential phishing email bait include: (Check all that apply)

    • A.

      It includes the company's logo and name

    • B.

      It tries to evoke an emotional response to a false crisis

    • C.

      It uses urgent, business-like language

    • D.

      It makes a request of the user’s personal information

    Correct Answer(s)
    B. It tries to evoke an emotional response to a false crisis
    C. It uses urgent, business-like language
    D. It makes a request of the user’s personal information
    Explanation
    The correct answer is: it tries to evoke an emotional response to a false crisis, it uses urgent, business-like language, it makes a request of the user’s personal information.

    Phishing emails often try to create a sense of urgency or panic in the recipient by evoking an emotional response to a false crisis. They may use urgent, business-like language to make the recipient feel compelled to take immediate action. Additionally, phishing emails commonly make requests for the user's personal information, such as login credentials or financial details, as a means to deceive and exploit the recipient. Therefore, these signs indicate a potential phishing email bait.

    Rate this question:

  • 4. 

    When a web address in the email does not match the usual address of the site or login page of the business, it is very likely that the e-mail is from a phishing scam.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    If a web address in an email does not match the usual address of the site or login page of the business, it is highly likely that the email is part of a phishing scam. Phishing scams often involve tricking individuals into providing personal information or login credentials by impersonating a legitimate website or business. By using a different web address, the scammers attempt to deceive the recipient into thinking they are interacting with a legitimate source when in fact they are being targeted for fraudulent purposes. Therefore, the statement is true.

    Rate this question:

  • 5. 

    An unusually high number of grammatical mistakes may indicate the email is a phishing scam.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    An unusually high number of grammatical mistakes in an email can be a strong indication that the email is a phishing scam. Phishing scams are often carried out by individuals with limited language skills or those who use automated tools to generate mass emails. These scammers may not pay attention to grammar and spelling, resulting in numerous mistakes in their messages. Therefore, if an email contains a significant number of grammatical errors, it is advisable to be cautious and treat it as a potential phishing attempt.

    Rate this question:

  • 6. 

    Similar to phishing, pharming is a scam prompting users to disclose sensitive information.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Pharming is indeed a scam that tricks users into revealing their sensitive information. It involves redirecting users to fake websites that mimic legitimate ones, with the intention of stealing their personal data. This can be done through various methods, such as DNS cache poisoning or malware. Once on the fake website, users may unknowingly provide their usernames, passwords, credit card details, or other sensitive information, which can then be used for fraudulent purposes. Therefore, the statement is correct in stating that pharming is a scam that prompts users to disclose sensitive information.

    Rate this question:

  • 7. 

    What makes a pharming attack more difficult to recongnize is:

    • A.

      The email asking users for information appears completely legitimate

    • B.

      The web site visited by users appears completely legitimate

    • C.

      Users are not asked to provide any information at all

    • D.

      All of the above

    Correct Answer
    C. Users are not asked to provide any information at all
    Explanation
    A pharming attack is a type of cyber attack where the attacker redirects users to a fake website that appears to be legitimate. In this attack, users are not asked to provide any information at all, which makes it more difficult to recognize. Unlike phishing attacks where users are typically asked to enter their personal or sensitive information, pharming attacks manipulate the DNS system or use malware to redirect users to the fake website without any interaction required from the user. This lack of user interaction makes it harder for users to detect that they have been redirected to a malicious site, increasing the effectiveness of the attack.

    Rate this question:

  • 8. 

    Check all of the correct statements below:

    • A.

      Pages that begin with "http" are not secure.

    • B.

      Pages that begin with "https" are secure.

    • C.

      It is not safe to submit sensitive information on the pages that begin with "http".

    • D.

      It is safe to submit sensitive information on the pages that begin with "http" or "https".

    Correct Answer(s)
    A. Pages that begin with "http" are not secure.
    C. It is not safe to submit sensitive information on the pages that begin with "http".
    Explanation
    Pages that begin with "http" are not secure because "http" stands for Hypertext Transfer Protocol, which is not encrypted and can be easily intercepted by hackers. Therefore, sensitive information submitted on these pages can be easily accessed by unauthorized individuals. On the other hand, pages that begin with "https" are secure because they use Hypertext Transfer Protocol Secure, which encrypts the data being transmitted, ensuring that it cannot be easily intercepted or accessed by hackers. Hence, it is not safe to submit sensitive information on the pages that begin with "http".

    Rate this question:

  • 9. 

    When filling out a form with sensitive information, it is important to verify that:

    • A.

      The web address begins with "https"

    • B.

      There is a picture of a lock in the right bottom corner of the page

    • C.

      The web page states that this web site is secure

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    When filling out a form with sensitive information, it is important to verify that the web address begins with "https" because this indicates that the connection is secure and encrypted. Additionally, the presence of a picture of a lock in the right bottom corner of the page is another indicator of a secure connection. Lastly, the web page stating that the website is secure provides further assurance that the information will be protected. Therefore, all of the mentioned factors should be checked to ensure the safety of the sensitive information.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 17, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 17, 2010
    Quiz Created by
    KatyaM
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.