1.
Dear Gmail User,
Due to a glitch in our servers, we have lost all of your stored information.
Please send us your personal information with your email and password and social security number so that we can restore it to our database.
Thanks,
The Gmail Team
What is the correct way to respond to this email?
Correct Answer
B. "What kind of a 'pHishy' scam is this?" *DELETE!*
Explanation
Woah! This email is asking you for your personal information, not to mention account information, AND social security number. The legitimate Google Inc. will NEVER send an email asking you for this.
2.
Which of these are NOT a function of spyware?
Correct Answer(s)
A. Blow up your computer.
C. Eat all of your favorite pizza.
E. Divide by zero.
F. Respect your privacy.
Explanation
Look at the term spyware. SPYware. This malicious program is here to take your information, and it is a digital malicious program, therefore, it will NOT respect privacy, or do any physical inconvenience.
3.
Rick Astley would never...
Correct Answer(s)
A. Give you up.
B. Let you down.
C. Run around and desert you.
D. Make you cry.
E. Say goodbye.
F. Tell a lie and hurt you.
Explanation
Ha! I just RICK ROLL'D YOU! LOL! I AM A TROLL! I WIN!
4.
Correct Answer
A. True
ExplanationThe statement is true because forwarding any spam emails to
[email protected] is a recommended action to take. This email address is provided by the U.S. government's Federal Trade Commission (FTC) for reporting and forwarding spam emails. By doing so, individuals can help the authorities track down and take action against spammers, ultimately contributing to reducing the amount of spam in circulation and protecting others from potential scams or fraudulent activities.
5.
Which one of these options present a red flag for a phishing scam?
Correct Answer
C. Your ISP asking you by email to click on an unknown link.
Explanation
Your legitimate ISP needs reason to have you click on that link. The others don't present a red flag. (Though you should bow to me right now. :3)
6.
__________
Correct Answer
^VWRyr%GES
Explanation
How are you supposed to tell what to write in there? Obviously, this question is messing with you.
7.
Which one of these options is a sign of malware?
Correct Answer
B. Unknown files of unknown origin.
Explanation
Files that you don't know where it came from, or who created it could be a red flag for malware. The rest of the answers is like cake, a lie.
8.
If you suspect that the software you are downloading is spyware, where should you look to see if the program may be bundled with spyware?
Correct Answer
A. The programs EULA.
Explanation
You should look at the programs EULA. If you can't understand it, it may be bundling malicious software. On the other hand, user reviews may just be there to praise the software. And no, I can't exactly determine if that one program is spyware.
9.
The best way to get your credit report is through talking to your printer.
Correct Answer
B. False
Explanation
The Fair Credit Reporting Act allows you to ask and receive one free credit report every 12 months from the three nationwide credit reporting companies. With that in mind, talking to your printer is not only just plain silly, it won't give you your credit report.
10.
Do you want to stop taking this quiz?
Correct Answer
B. Nah.
Explanation
Too bad, you are not allowed to. But if you said "Nah," that's good. You're determined to finish this quiz.
11.
Which of these three are NOT a sign of identity theft?
Correct Answer
C. Your magazine subscription has expired.
Explanation
The fact that your magazine subscription has expired is not a sign of identity theft because it is a normal occurrence that can happen to anyone. On the other hand, not receiving any bills from your creditor and having unknown credit cards that you didn't sign up for are both indicators of possible identity theft. These situations suggest that someone may have gained unauthorized access to your personal information and is using it for fraudulent activities. It is important to monitor your financial statements and credit reports regularly to identify any suspicious or unauthorized transactions.
12.
Which one of these seven are potentially fraudulant spam?
Correct Answer(s)
B. Your bank account has been compromised. Give us your credit card number to get assistance from your bank.
E. Has your home been foreclosed? We will pre-qualify you for just a tiny bit of money!
G. A whole bunch of free gifts for you! All for just $1.00!
Explanation
The answer includes three potential fraudulent spam messages. The first message is asking for credit card information under the pretense of assisting with a compromised bank account, which is a common phishing tactic. The second message is offering assistance for a foreclosed home, but it requires a small payment upfront, which is suspicious. The third message promises a "whole bunch of free gifts" for just $1.00, which is likely a scam as it is too good to be true.
13.
You should know the ________, _______, and ____________ of the company you are dealing with.
Correct Answer(s)
B. pHone number
E. Address
F. Identity
Explanation
Knowing the identity, address, and phone number ensures that you can contact that company so that you can't trust it. If that company refuses to provide any of these, you shouldn't trust them.
14.
Are you an idiot?
Correct Answer
C. No
Explanation
I know that you are NOT an idiot. Still, don't hit me for asking a ridiculous question like that.
15.
Which one of these terms is not a type of malware?
Maybe this can help?
Correct Answer
B. Clown
Explanation
I'm sorry. Did I just throw a difficult question right in the beginning? Don't worry though, this question isn't graded. (But if you got this one right, I would be impressed.)