1.
This technique tries to take information from the user, but the user actively gave the information. Common things taken are credit cards, usernames, passwords, and home addresses.
Correct Answer
A. pHishing
Explanation
Phishing is a technique where attackers try to obtain sensitive information from users by pretending to be a trustworthy entity. They often use deceptive emails, messages, or websites that appear legitimate to trick users into revealing personal information such as credit card details, usernames, passwords, and home addresses. The user willingly provides this information, unaware that they are being scammed.
2.
How would you be able to protect yourself from phishing?
Correct Answer
D. B&C
Explanation
To protect yourself from phishing, you can take the following measures: Get an Anti-Virus Program to detect and block any malicious software or links that may be present in phishing emails or websites. Additionally, changing passwords every 4-6 months helps prevent unauthorized access to your accounts, reducing the risk of falling victim to phishing attacks.
3.
What clue is certain that you may have spyware on your computer which can cause your performance of the computer to be slower due to many?
Correct Answer
C. Popups
Explanation
Popups are a certain clue that you may have spyware on your computer. Spyware often generates unwanted popups, which can significantly slow down the performance of the computer. These popups can appear randomly and frequently, disrupting the user's experience and indicating the presence of malicious software.
4.
How does spyware infect a computer?
Correct Answer
D. All the above
Explanation
Spyware can infect a computer through various means. Popups can be used to trick users into clicking on malicious links or downloading infected files. Theft of personal information refers to spyware collecting sensitive data such as passwords, credit card details, or social security numbers without the user's knowledge. Recording web information involves spyware monitoring and logging the user's browsing habits, including websites visited and search queries. Therefore, all the options mentioned above can be ways in which spyware infects a computer.
5.
How does identity theft cause problems for online users?
Correct Answer
D. All of the above
Explanation
Identity theft causes problems for online users because it involves stealing social security numbers, locating personal information such as address, and stealing bank information. These actions can lead to financial loss, unauthorized access to personal accounts, and potential harm to one's reputation and privacy. It is important for online users to take precautions and safeguard their personal information to prevent falling victim to identity theft.
6.
Why is identity theft something hackers usually go for?
Correct Answer
A. Personal Information
Explanation
Hackers usually go for identity theft because personal information is valuable and can be used for various malicious activities. By obtaining someone's personal information, hackers can impersonate them, gain unauthorized access to their accounts, commit financial fraud, or even sell the information on the dark web. Personal information such as social security numbers, bank account details, and addresses can provide hackers with the means to carry out their illegal activities and exploit their victims. Therefore, identity theft is a common objective for hackers due to the potential financial gain and the ability to cause significant harm to individuals.
7.
Josh has been messaging a stranger online. They have been talking for a couple of weeks now, and the stranger want's Josh's email. Trusting him, Josh gives his email to the stranger. After, the stranger cuts off all conversations between Josh, and Josh sees that he has thousands of emails in his inbox from different companies, people, and junk. What is the thousands of emails ,because of the messaging, a form of what? The stranger's name is Kevin.
Correct Answer
C. Spam through email
Explanation
The correct answer is "Spam through email" because after giving his email to the stranger, Josh received thousands of emails from different sources, indicating that his email address was used to send unsolicited and unwanted messages, which is commonly referred to as spam.
8.
Spam causes emails to be victims of tons and tons of junk mail. With that said, that is spam through email. How are there other ways spam can give tons and tons of junk?
Correct Answer
D. All the above
Explanation
Spam can give tons and tons of junk through forums, messaging, and online gaming in addition to email. These methods involve sending unsolicited and unwanted messages or advertisements to a large number of users, overwhelming them with irrelevant content. This can disrupt the normal functioning of these platforms and cause inconvenience to users. Therefore, spam can be a problem across various online channels, not just limited to email.
9.
This type of software is on computers and collects small pieces of information from users. It is also difficult to detect, what is it?
Correct Answer
D. Spyware
Explanation
Spyware is a type of software that is installed on computers without the user's consent and collects small pieces of information from users. It is designed to operate stealthily, making it difficult to detect. Unlike spam, which refers to unsolicited and unwanted emails, malware, which encompasses various types of malicious software, and phishing, which involves tricking users into revealing sensitive information, spyware specifically focuses on gathering user data without their knowledge.
10.
Many malware programs gather information that leads to loss of privacy. How can you generally be protected from this?
Correct Answer
C. Anti-Virus Program
Explanation
An anti-virus program is a software designed to detect, prevent, and remove malware from a computer system. By regularly scanning the system, it can identify and eliminate any malicious programs that may be gathering sensitive information and compromising privacy. Therefore, having an anti-virus program installed and regularly updated on your computer can provide general protection against malware and help safeguard your privacy.