1.
Fill in the blank with the best answer choice below.
To protect yourself from identity theft, place a _________ on your credit reports.
Correct Answer
A. Fraud Alert
Explanation
To protect yourself from identity theft, placing a fraud alert on your credit reports is the best answer choice. A fraud alert is a precautionary measure that notifies credit reporting agencies to take extra steps to verify your identity before granting credit in your name. This helps to prevent unauthorized individuals from opening new accounts or making changes to existing ones without your knowledge or consent.
2.
When you know you are in danger of losing you're identity or have already lost your identity, you should-
Correct Answer
C. All of the above
Explanation
When you know you are in danger of losing your identity or have already lost your identity, it is important to take immediate action to protect yourself. Reporting the theft to the Federal Trade Commission (FTC) is crucial as they can assist in investigating the situation and providing guidance on how to recover your identity. Filing a police report is also necessary as it creates an official record of the crime and can aid in any legal proceedings. Therefore, both options should be pursued to ensure the best possible outcome in such a situation.
3.
One option you have when your identity has been stolen is to notify ____
Correct Answer
A. Federal Trade Commission
Explanation
When your identity has been stolen, one option you have is to notify the Federal Trade Commission. The Federal Trade Commission (FTC) is a government agency that works to protect consumers from fraudulent activities, including identity theft. By notifying the FTC, they can provide you with resources and guidance on how to handle the situation, such as filing a report, creating an identity theft recovery plan, and assisting with any legal actions that may be necessary. They can also help you in communicating with other relevant agencies and organizations to resolve the issue effectively.
4.
What should you do with an account that has been tampered with?
Correct Answer
A. Close it immediately
Explanation
When an account has been tampered with, it is crucial to take immediate action to protect your personal information and prevent further unauthorized access. Closing the account immediately is the most appropriate course of action in such a situation. This will help to limit any potential damage or misuse of your account and ensure the security of your personal data. Giving out your password and email to someone you trust or selecting "all of the above" are not recommended actions, as they can further compromise the security and privacy of your account.
5.
Which of the three choices below is the best decision to make when to protect your personal information in regarding your e-mail?
Correct Answer
A. Share information only with companies you know and trust.
Explanation
The best decision to make when protecting your personal information regarding your email is to share information only with companies you know and trust. This is because sharing information with unknown or untrustworthy companies can put your personal information at risk of being misused or compromised. By only sharing information with known and trusted companies, you can minimize the chances of your personal information falling into the wrong hands.
6.
Sould you or should you not read the small print when signing a contract or agreeing to make a payment online?
Correct Answer
A. Definitely read EVERYTHING.
Explanation
It is important to read the small print when signing a contract or agreeing to make a payment online because it contains important details and terms that may affect you. By reading everything, you can ensure that you understand the obligations, rights, and potential risks associated with the contract or payment. Neglecting to read the small print may lead to misunderstandings, unexpected charges, or unfavorable conditions that could have been avoided with careful consideration. Therefore, it is highly recommended to read everything before making any commitments.
7.
Never pay fo a _____ gift.
Correct Answer
A. Free
Explanation
It is advised to never pay for a free gift because by definition, a gift is something that is given without any cost or payment. Therefore, paying for a gift would contradict the concept of it being free.
8.
When paying or ordering something through the internet. you should _________
Correct Answer
A. Take your time
Explanation
When paying or ordering something through the internet, it is important to take your time. This means that you should not rush through the purchasing process but instead carefully consider your options, review the product details, compare prices, and read customer reviews if available. Taking your time allows you to make an informed decision and reduces the chances of making a hasty purchase that you might regret later. It also helps to ensure that your personal and financial information is entered correctly and securely, minimizing the risk of any errors or fraud.
9.
What is the term "Malware" short for?
Correct Answer
A. Malicious Spyware
Explanation
The term "Malware" is short for "Malicious Spyware." Malware refers to any software or program that is designed to harm or exploit a computer system or its users. Spyware, on the other hand, is a type of malware that secretly collects information about a user's activities without their knowledge or consent. Therefore, "Malicious Spyware" accurately describes the term "Malware" as it highlights its malicious intent and specifically mentions the spyware aspect of it.
10.
Choose the best answer below.
If you think that there is even a slight possibility that Malware is on your computer, then you should:
Correct Answer
A. Stop shopping and other online activities that requires any personal information.
Explanation
If there is a possibility of malware on your computer, it is important to stop shopping and other online activities that require personal information. This is because malware can potentially steal your personal information, such as credit card details or login credentials, and use it for malicious purposes. By stopping these activities, you can minimize the risk of your personal information being compromised. Reporting the problem and continuing with your usual online activities may not address the potential threat posed by malware.
11.
Choose the best answer below.
If you suspect that there is a slight possibility that you may have Malware on your computer ______
Correct Answer
A. Confirm that your security software is up-to-date
Explanation
If you suspect that there is a slight possibility that you may have Malware on your computer, it is important to confirm that your security software is up-to-date. This is because having the latest updates ensures that your security software has the most recent virus definitions and can effectively detect and remove any malware that may be present on your computer. Ignoring the issue or continuing with your usual activities without checking the security software may leave your computer vulnerable to further malware infections or potential damage.
12.
When dealing with Malware, you may want to run a second _______
Correct Answer
C. All of the above
Explanation
When dealing with Malware, it is recommended to run a second anti-virus program or an anti-spyware program. This is because different programs have different detection capabilities and can identify different types of malware. Running multiple programs increases the chances of detecting and removing any malicious software present on the system. Therefore, using both an anti-virus program and an anti-spyware program is the best approach to ensure comprehensive protection against malware.
13.
If you ignore the fact that you have malware, you could possibly --
Correct Answer
A. Have an infected computer
Explanation
Ignoring the fact that you have malware means not taking any action to remove or address the malware present on your computer. This can lead to various consequences, one of which is having an infected computer. By not acknowledging the presence of malware and not taking steps to remove it, the malware can continue to cause harm and compromise the security and functionality of the computer.
14.
Phishing is a _____
Correct Answer
scam
Explanation
Phishing is a scam where fraudsters attempt to deceive individuals into revealing sensitive information such as passwords, credit card numbers, or social security numbers. They often masquerade as trustworthy entities through emails, phone calls, or websites, tricking unsuspecting victims into providing their personal information. This fraudulent activity is commonly used for identity theft or financial gain.
15.
To avoid Phishing, you should _____
Correct Answer
A. Avoid opening pop-ups.
Explanation
To avoid phishing, it is important to avoid opening pop-ups. Phishing is a fraudulent practice where attackers try to trick individuals into revealing sensitive information such as passwords or credit card details by pretending to be a trustworthy entity. Pop-ups can often be used as a method to deceive individuals into clicking on malicious links or providing personal information. Therefore, it is crucial to be cautious and avoid opening any suspicious pop-ups to protect oneself from falling victim to phishing attacks.
16.
To avoid Phishing--
Correct Answer
A. Use anti-spyware software
Explanation
Using anti-spyware software is an effective way to avoid phishing attacks. Phishing is a fraudulent activity where attackers try to deceive individuals into revealing sensitive information such as passwords or credit card details. Anti-spyware software helps detect and remove malicious software that can be used for phishing purposes. By regularly scanning the computer for any potential threats, the software can provide protection against phishing attempts. Therefore, using anti-spyware software is a recommended measure to prevent falling victim to phishing attacks.
17.
To lower your risks of spyware infectiions---
Correct Answer
A. Don't click on links inside pop-ups
Explanation
Clicking on links inside pop-ups can often lead to spyware infections. Pop-ups are often used by malicious actors to trick users into clicking on links that may lead to the installation of spyware on their computer. By avoiding clicking on these links, users can significantly lower their risks of spyware infections.
18.
To lower your risks of spyware infections--
Correct Answer
A. Use anti-virus software
Explanation
Using anti-virus software is an effective way to lower the risk of spyware infections. Anti-virus software is designed to detect, prevent, and remove malicious software, including spyware, from a computer system. It scans files and programs for any suspicious activity or known patterns of malware, providing protection against various types of threats. By regularly updating and running anti-virus software, users can significantly reduce the chances of their devices being infected with spyware and experiencing its detrimental effects on privacy and security.