1.
What is Identity Theft?
Correct Answer
B. When someone illegally takes posession of your personal data
Explanation
Identity theft refers to the act of someone unlawfully acquiring and using another person's personal information for fraudulent purposes. This can include stealing sensitive data such as social security numbers, bank account details, or passwords, with the intention of impersonating the victim or conducting financial fraud. It is a serious crime that can lead to significant financial loss and damage to an individual's reputation.
2.
How do you prevent Identity Theft?
Correct Answer
D. Do not provide personal information to the public
Explanation
The correct answer is to not provide personal information to the public. This is because sharing personal information, such as your social security number, address, or financial details, can increase the risk of identity theft. By keeping your personal information private and only sharing it with trusted sources, you can reduce the chances of someone using your identity for fraudulent purposes.
3.
Which of these is the most secure password?
Correct Answer
C. RainbowFishMonkey900
Explanation
RainbowFishMonkey900 is the most secure password because it contains a combination of uppercase and lowercase letters, numbers, and special characters. This complexity makes it difficult for hackers to guess or crack the password using common methods such as dictionary attacks. Additionally, the length of the password adds an extra layer of security.
4.
A _________________________ is computer software or computer hardware that can intercept and log traffic passing over a digital network or part of a network.
Correct Answer
packet sniffer
Explanation
A packet sniffer refers to computer software or hardware that has the ability to intercept and record the data that is being transmitted over a digital network. It can capture and analyze the network traffic, allowing users to monitor and inspect the packets of data that are being sent and received. This can be useful for network administrators to troubleshoot network issues, analyze network performance, or detect any potential security breaches or unauthorized activities on the network.
5.
______________________ is the use of the Internet and related technologies to harm other people, in a deliberate, repeated, and hostile manner.
Correct Answer
Cyberbullying
Explanation
Cyberbullying refers to the intentional and repetitive use of the Internet and related technologies to harm or harass others. It involves hostile behavior such as sending threatening messages, spreading rumors, or sharing embarrassing information online. This form of bullying can have serious psychological and emotional effects on the victims, leading to anxiety, depression, and even suicide in extreme cases. It is important to address and prevent cyberbullying to create a safe and respectful online environment for everyone.
6.
___________________________ refer to the identification of humans by their characteristics or traits.
Correct Answer
Biometrics
Explanation
Biometrics refers to the identification of humans by their characteristics or traits. This can include physical attributes such as fingerprints, iris patterns, or facial recognition, as well as behavioral characteristics like voice or typing patterns. Biometric identification is considered more secure and reliable than traditional methods like passwords or ID cards, as it is unique to each individual and difficult to replicate. It is widely used in various applications, such as access control systems, border security, and mobile device authentication.
7.
Antivirus software is used to create, distribute, and enforce the use of malware.
Correct Answer
B. False
Explanation
Antivirus software is used to detect, prevent, and remove malware, not create, distribute, or enforce its use. Its purpose is to protect computer systems from malicious software and ensure their security.
8.
What are cookies?
Correct Answer
A. Designed to hold a modest amount of data specific to a client and website
Explanation
The correct answer is "Designed to hold a modest amount of data specific to a client and website." This answer accurately describes what cookies are in the context of web browsing. Cookies are small text files that are stored on a user's computer by a website. They are designed to hold information about the user's interactions with the website, such as login credentials, preferences, and browsing history. This information can then be used by the website to provide a personalized experience for the user.
9.
A secure website is one that capability of securely and privately exchanging data and financial transactions. This involves the encryption of data in transit.
Correct Answer
A. True
Explanation
A secure website is capable of securely and privately exchanging data and financial transactions by encrypting the data in transit. This means that the information being transmitted between the website and the user is encoded in a way that only authorized parties can access and understand it. This encryption ensures that sensitive information, such as personal data or credit card details, cannot be intercepted or accessed by unauthorized individuals. Therefore, the statement "A secure website is one that has the capability of securely and privately exchanging data and financial transactions. This involves the encryption of data in transit." is true.
10.
Which of these seems like it would be the most secure website?
Correct Answer
A. Https://scsmail01.scs.on.ca/owa
Explanation
The website https://scsmail01.scs.on.ca/owa appears to be the most secure because it begins with "https" instead of "http," indicating that it has a secure connection. Additionally, the domain name suggests that it belongs to a specific organization or institution, which often implies a higher level of security compared to generic websites like Wikipedia or The Dog Island.
11.
Click all of the examples of Identity Theft.
Correct Answer(s)
A. Criminal Identity Theft
D. Account Takeover Fraud
E. Identity Cloning
G. Medical Identity Theft
H. Commercial Identity Theft
I. New Account Fraud
Explanation
Identity theft is the fraudulent acquisition and use of someone's personal information for financial gain. Criminal Identity Theft involves an individual assuming another person's identity to commit crimes. Account Takeover Fraud is when a person gains unauthorized access to someone's financial account. Identity Cloning refers to creating a new identity using someone else's personal information. Medical Identity Theft occurs when someone uses another person's identity to obtain medical services or prescriptions. Commercial Identity Theft involves using someone's identity for fraudulent business transactions. New Account Fraud is when someone opens a new account using another person's information without their knowledge or consent.
12.
The website used to check the security of one's password is:
www._________________________.net
Correct Answer(s)
howsecureismypassword
Explanation
The correct answer is "howsecureismypassword". This is a website that allows users to check the security strength of their passwords. By entering their password into the website, users can receive an estimate of how long it would take for a hacker to crack their password. This can help users determine if their password is strong enough or if they need to make it more secure.
13.
The website used to create new, secure passwords is: www._______________________________.net
Correct Answer(s)
makemeapassword
Explanation
The correct answer is "makemeapassword" because it is the name of the website used to create new, secure passwords. The website likely provides a service where users can generate strong passwords that are difficult to guess or crack. By using this website, individuals can ensure that their online accounts are protected and less vulnerable to hacking or unauthorized access.
14.
Which one of the following emphasises all forms of identity theft?
Correct Answer
B. Identity Cloning
Explanation
Identity cloning is the correct answer because it encompasses all forms of identity theft. Identity cloning refers to the act of assuming someone else's identity, which can include stealing personal information to create new accounts (new account fraud), using someone's identity to commit crimes (criminal identity theft), and taking control of someone's existing accounts (account takeover fraud). Therefore, identity cloning covers all aspects of identity theft.