1.
Email is a secure form of communication.
Correct Answer
B. False
Explanation
Email is not inherently secure. While email providers may offer encryption options, the default transmission of emails is typically not secure. Emails can be intercepted and read by hackers or other unauthorized individuals. Therefore, it is important to take additional measures, such as using end-to-end encryption or secure email services, to ensure the security of sensitive information communicated through email.
2.
Your social security number is the most important information for a hacker. Second is your mother's maiden name.
Correct Answer
A. True
Explanation
Your social security number is a crucial piece of personal information that can be used by hackers for identity theft, fraud, and other malicious activities. It is often used as a unique identifier and can grant access to sensitive data or financial accounts. Additionally, your mother's maiden name is commonly used as a security question or verification method, making it valuable to hackers who can use it to gain unauthorized access to your accounts. Therefore, both your social security number and your mother's maiden name are highly sought after by hackers, making the statement true.
3.
It is easy for your picture and other material to appear online without your knowledge.
Correct Answer
A. True
Explanation
This statement is true because with the vast amount of information being shared online, it is possible for pictures and other material to be uploaded and circulated without the knowledge or consent of the person involved. This can happen through various means such as social media platforms, file-sharing websites, or even through the actions of others who may have access to the material. It is important for individuals to be cautious about what they share online and to take steps to protect their privacy and personal information.
4.
When you sign up for social media, your contact information is totally secure.
Correct Answer
B. False
Explanation
When signing up for social media, your contact information is not completely secure. Social media platforms often collect and store user data, including contact information, which can be accessed by the platform itself and potentially by third parties. While platforms may have security measures in place to protect user data, there is always a risk of data breaches or unauthorized access. Therefore, it is important to be cautious and mindful of the information shared on social media platforms.
5.
Belonging to social media - such as Whisper - where users have anonymity, is a very good idea.
Correct Answer
B. False
Explanation
The statement suggests that having anonymity on social media platforms like Whisper is a good idea. However, this may not be entirely true. While anonymity can provide a sense of freedom and encourage open communication, it can also lead to negative consequences. Anonymity often leads to cyberbullying, spreading false information, and harassment. It is important to have accountability and responsibility while using social media platforms to maintain a safe and respectful online environment.
6.
For privacy reasons, having one E-mail account is best.
Correct Answer
B. False
Explanation
Having one email account is not necessarily the best option for privacy reasons. Using multiple email accounts can provide additional layers of security and privacy. By using separate accounts for different purposes, such as personal and professional use, individuals can better control the information they share and limit the risk of data breaches or unauthorized access. Additionally, having multiple accounts allows for easier management of spam and unwanted emails, as well as the ability to compartmentalize communication and maintain better organization. Therefore, the correct answer is False.
7.
European credit cards are more secure than U.S. credit cards.
Correct Answer
A. True
Explanation
European credit cards are more secure than U.S. credit cards because they use a technology called EMV (Europay, Mastercard, and Visa) which provides an extra layer of security. EMV cards have a microchip embedded in them that creates a unique transaction code for each purchase, making it difficult for fraudsters to clone the card or steal sensitive information. In contrast, most U.S. credit cards still rely on magnetic stripe technology, which is easier to counterfeit. Additionally, European credit cards often require the use of a PIN for transactions, adding an extra level of authentication.
8.
The Google search engine does not track us.
Correct Answer
B. False
Explanation
The statement "The Google search engine does not track us" is false. Google tracks user activity and collects data for various purposes such as personalized search results, targeted advertising, and improving user experience. This tracking is done through the use of cookies, IP addresses, and other technologies. Google's privacy policy clearly states that they collect and store user information. Therefore, the correct answer is false, as Google does track user activity.
9.
It's a good practice to periodically check yourself out on Google.
Correct Answer
A. True
Explanation
Periodically checking oneself on Google is indeed a good practice. By searching for one's name or relevant information, individuals can ensure that the information available about them online is accurate and up to date. This can be especially important for professionals who want to maintain a positive online presence and reputation. Additionally, checking oneself on Google can help identify any potential privacy concerns or instances of identity theft. Therefore, the statement "It's a good practice to periodically check yourself out on Google" is true.
10.
You should have virus protection on all your electronic devices and regularly clear out temporary files.
Correct Answer
A. True
Explanation
Having virus protection on all electronic devices is important because it helps to detect and remove any malicious software that can harm the devices or compromise their security. Regularly clearing out temporary files is also crucial as these files can accumulate over time and take up valuable storage space, potentially slowing down the device's performance. Therefore, it is recommended to have virus protection and regularly clear out temporary files to ensure the security and optimal functioning of electronic devices.
11.
Apple brand products such as iPhones have never been hacked.
Correct Answer
B. False
Explanation
The statement that Apple brand products such as iPhones have never been hacked is false. Apple products have indeed been hacked in the past. There have been instances where security vulnerabilities have been exploited to gain unauthorized access to iPhones and other Apple devices. While Apple has implemented strong security measures, no system is completely immune to hacking. Therefore, it is incorrect to claim that Apple products have never been hacked.
12.
It is OK to use the same password for 10 or more accounts as long as the password is considered 'very strong.'
Correct Answer
B. False
Explanation
Using the same password for multiple accounts, regardless of its strength, is not recommended. If one account gets compromised, all the other accounts with the same password would also be at risk. It is always advisable to use unique passwords for each account to enhance security and minimize the potential damage of a security breach.
13.
Material that appears on the Web (a photo, a story, etc.) almost always can be found after it is deleted.
Correct Answer
A. True
Explanation
When material is published on the web, it becomes part of the digital landscape and can be easily copied, shared, and stored by others. Even if the original source deletes the material, it is highly likely that copies of it will still exist on other platforms or devices. Additionally, web archives and caching systems often keep records of web content, making it possible to retrieve deleted material. Therefore, it is generally true that material that appears on the web can be found even after it is deleted.
14.
If your credit card information is stolen, your personal liability for any online purchases made with that card is zero.
Correct Answer
A. True
Explanation
If your credit card information is stolen, your personal liability for any online purchases made with that card is zero. This is because of the Fair Credit Billing Act (FCBA), which protects consumers from being held responsible for unauthorized charges made on their credit cards. According to the FCBA, if you report the theft or loss of your credit card before any fraudulent charges are made, you are not liable for those charges. This means that if your credit card information is stolen and used for online purchases, you are not responsible for the charges and will not be held financially accountable.
15.
Phishing is a harmless business practice.
Correct Answer
B. False
Explanation
Phishing is not a harmless business practice. It is a form of cybercrime where individuals or organizations attempt to deceive others into providing sensitive information, such as passwords or credit card details, by pretending to be a trustworthy entity. Phishing can lead to financial loss, identity theft, and other harmful consequences for the victims. Therefore, the statement that phishing is a harmless business practice is false.
16.
Facebook is a safe haven for posting any kind of information because employers rarely check people out on Facebook.
Correct Answer
B. False
Explanation
The statement is false because it suggests that Facebook is a safe place for posting any kind of information because employers rarely check people out on Facebook. However, this is not true as employers often use social media platforms like Facebook to gather information about potential candidates. It is important to be cautious about the information posted on Facebook, as it can have an impact on one's professional life.
17.
The best way to handle spam is to click on the "unsubscribe" link that appears at the bottom of any email message.
Correct Answer
B. False
Explanation
Clicking on the "unsubscribe" link at the bottom of any email message is not always the best way to handle spam. In fact, doing so can sometimes lead to more spam. This is because some spammers use the "unsubscribe" link to confirm that the email address is active and then continue to send more spam. It is generally recommended to mark spam emails as spam and delete them without clicking on any links.
18.
It is OK to leave your phone's GPS tracking software in the "on" position.
Correct Answer
B. False
Explanation
Leaving your phone's GPS tracking software in the "on" position can have potential privacy and security risks. When the GPS is enabled, it constantly tracks and shares your location information, which can be accessed by various apps and potentially misused by hackers or unauthorized individuals. Therefore, it is advisable to turn off the GPS tracking software when not in use to protect your privacy and ensure the security of your personal information.
19.
Young adults are more vulnerable to hacking and identity theft threats.
Correct Answer
A. True
Explanation
Young adults are more vulnerable to hacking and identity theft threats because they tend to be more active online and may not have developed strong cybersecurity habits. They often have a larger online presence through social media and online shopping, making them attractive targets for hackers. Additionally, young adults may be less experienced in recognizing and avoiding phishing scams or suspicious websites, making them more susceptible to identity theft. Therefore, it is true that young adults are more vulnerable to hacking and identity theft threats.
20.
A public Wi-Fi hotspot is as secure as a wireless connection in your home.
Correct Answer
B. False
Explanation
A public Wi-Fi hotspot is not as secure as a wireless connection in your home. When you connect to a public Wi-Fi network, your data can be intercepted by hackers who are connected to the same network. This can lead to potential security breaches and unauthorized access to your personal information. On the other hand, a wireless connection in your home can be secured with a password and encryption, providing a higher level of security.