1.
It's safe to click on any link in an email that asks for your personal information. (True or False)
Correct Answer
B. False
Explanation
It is not safe to click on any link in an email that asks for your personal information. This is because it could be a phishing attempt, where scammers try to trick you into revealing sensitive information such as passwords or credit card details. It is always recommended to verify the authenticity of the email and the sender before clicking on any links or providing personal information.
2.
Phishing tricks attempt to try and steal what kind of information?
Correct Answer
E. All of the above
Explanation
Phishing tricks are fraudulent attempts to deceive individuals into revealing sensitive information such as PIN numbers, Social Security Numbers, bank account numbers, and even personal details like the mother's maiden name. These cybercriminals use various tactics like fake emails, websites, or phone calls to trick victims into providing their confidential information. By selecting "All of the above," it implies that phishing tricks aim to steal all the mentioned types of information.
3.
The most common method (s) for a phishing attempt would be by:
Correct Answer
E. Both A and C
Explanation
The correct answer is "Both A and C" because phishing attempts can be made through both phone and email. Phishing is a fraudulent activity where the attacker poses as a trustworthy entity to deceive individuals into revealing sensitive information such as passwords or credit card numbers. Phishing through phone calls, known as vishing, involves the attacker pretending to be a legitimate organization and requesting personal information. Phishing through email, known as email phishing, involves sending deceptive emails that appear to be from reputable sources, tricking recipients into clicking on malicious links or providing confidential information.
4.
Legitimate companies would not contact you by phone or email without any prior notice. (True or False)
Correct Answer
A. True
Explanation
Legitimate companies typically follow proper communication protocols and would not randomly contact individuals through phone or email without any prior notice. They usually establish contact through official channels, such as customer service or email support, and may require prior interaction or consent from the individual before initiating any communication. Unsolicited phone calls or emails from unknown sources are often associated with scams or fraudulent activities. Therefore, it is generally true that legitimate companies would not contact you without any prior notice.
5.
3.2 million people fell victim to phishing attempts last year. (True or False)
Correct Answer
A. True
Explanation
The given statement is true. It states that 3.2 million people fell victim to phishing attempts last year. This means that a large number of individuals were targeted by fraudulent attempts to obtain their sensitive information, such as passwords or credit card details. Phishing is a common cybercrime technique where attackers impersonate trustworthy entities to deceive victims into revealing their personal information. The high number of victims highlights the prevalence and effectiveness of phishing attacks as a significant threat to online security.
6.
Social networking sites are safe from phishing. (True or False)
Correct Answer
B. False
Explanation
False. Social networking sites are not completely safe from phishing. Phishing attacks can occur on social media platforms through various methods, such as fake login pages, malicious links, or impersonation of trusted contacts. Users should be cautious and verify the authenticity of any requests or messages they receive on social networking sites to protect themselves from falling victim to phishing scams.
7.
What is the age group most affected by online identity theft?
Correct Answer
B. 18-29 year olds
Explanation
The age group most affected by online identity theft is 18-29 year olds. This is because individuals in this age range tend to be more active online, frequently using social media platforms, online banking, and making online purchases. They may also be less experienced in recognizing and avoiding online scams or protecting their personal information, making them more vulnerable to identity theft. Additionally, young adults in this age group often have a higher level of digital literacy and are more likely to engage in risky online behaviors, such as sharing personal information or using weak passwords, which can increase their risk of becoming a victim of identity theft.
8.
Which of the following ways do teens NOT compromise their online security?
Correct Answer
C. Participating in chatrooms.
Explanation
Teens compromise their online security in various ways, such as using their real names on social networking sites, using social security numbers for online job applications, and responding to phishing attempts. However, participating in chatrooms is not a way in which teens compromise their online security. Chatrooms may have their own risks, but they do not directly involve compromising personal information or falling for online scams.
9.
What is the best way to prevent phishing from being successful?
Correct Answer
B. Educate people about pHishing.
Explanation
The best way to prevent phishing from being successful is by educating people about it. By increasing awareness and knowledge about phishing techniques, individuals can learn to recognize and avoid suspicious emails, links, and requests for personal information. Education can empower people to be cautious and vigilant while using the internet, ultimately reducing the chances of falling victim to phishing attacks.
10.
Spam filters can be used to filter out emails from questionable email addresses. How do criminals get pass this problem?
Correct Answer
D. All of the above
Explanation
Criminals can get past spam filters by using various methods. Spoofing involves manipulating the email header to make it appear as if it is coming from a reputable source. Creating email accounts with reputable providers allows them to send emails that may not be flagged as spam. Hacking into a third-party email account gives them access to an already trusted email address. Therefore, all of the above options can be used by criminals to bypass spam filters.