No student devices needed. Know more
18 questions
Herman tells you that his computer has suddenly started to display random messages on screen. It has also stopped responding to keyboard and mouse input. Which of the following do you suspect has occurred?
The computer has been infected by adware.
The computer has been infected by spyware.
The computer has been infected with phishing.
The computer has been infected with a virus.
Rosie is excited to play the latest PC game. She navigates to a download site, pays the fee and is ready to download and install the game. What can Rosie do to make sure her security program has time to scan the application for malware before playing the new game?
When she is prompted to save, she should download the application instead of running it.
She should scan the application file with her anti-virus program before downloading.
She should scan the application while downloading is in progress.
She should choose to run the downloaded application and it will be run through her security software.
Daniel has a new e-mail message in his inbox. It appears to be an invitation from a college he has never heard of. The e-mail informs him that he has "received a scholarship" and is requesting personal information so that the college can process the "scholarship". What type of security threat might this be?
Phishing
Pharming
Adware
Virus
You are downloading and installing an application from the Internet. Which of the following is a best practice that you should follow to prevent installing malware accidentally?
Scan the application file with your anti-virus program before downloading.
Scan the application while downloading is in progress.
Once the application has finished installing, scan the program prior to using.
When prompted to save, download the application instead of running it.
Which of the following is a cyber-safety technique that you should use to protect yourself and your computer system from harm?
Store personal information on the computer or mobile device.
Always trust any adults that you meet online.
Always ask permission from content owners before downloading files.
Never share your passwords with anyone.
Eli stores all of his personal information on his mobile phone. Which of the following is a security risk that Eli faces if his phone is lost or stolen?
His parents will punish him for losing his phone.
Someone might return his phone to an address they find in his contacts.
He will have to purchase a new mobile phone, which will be expensive, and he will have to enter all his information again into the new phone.
Anyone who finds his phone will have access to personal information such as his user names, passwords, photos, home address, etc.
Mrs. Polly thinks one of her students has downloaded some software that she believes will harm the school computers. What type of software does Mrs. Polly think was downloaded?
Malware
Anti-virus
Adware
Spyware
Mr. Silverman says there is one simple thing that you can do that will protect yourself and your computer from malicious intent, even from people you know. What is that one thing?
Never share your passwords with anyone except your parents.
Never use a public computer.
Never allow people you don't know to e-mail you.
Never download updates from the Internet.
Tony is using the computer at the public library to write a report. After he has finished his work, he takes some time to look at social media. Is this safe?
No, public computers sometimes contain malware designed to capture any personal information, such as usernames and passwords.
Yes, public library computers are usually safe to use because they run the latest security software.
No, because he will not be able to log out of his social media account when he is done using it.
Yes, as long as he remembers not to add any new posts or upload any new images.
Amanda's computer is no longer functioning properly and is incredibly slow. She believes she has somehow installed a self-replicating program that has damaged the hard drive and is now affecting the computer's operation. What does Amanda's computer have?
A virus
Adware
A firewall
Ransomware
Jonathan is surfing the Internet when a window pops up advertising "Free vacations if you click here now!" There is a button labeled "Act now!" What should Jonathan do now?
He should close the pop-up window because the link can take him to a malicious site.
He should click on the link because the link may disappear soon.
He should copy the Web site name and share it with his friends.
He should run an anti-virus program.
Kelly has a problem with her computer. A message appears on her screen to call a phone number because there is a "security concern". She no longer has control of her keyboard or mouse. She is afraid to call the number because the message does not look like any of the other messages that have appeared on her computer. What has happened to Kelly's computer?
The computer has been infected with a virus.
The computer has been infected with a phishing scam.
The computer has been infected by adware.
The computer has been infected by spyware.
Mario has purchased a new computer. He wants to be sure that it remains in good condition. He also does not want the computer to become infected with any malware. What would be the most common activity to cause Mario's computer to become infected with malware?
Downloading software
Playing online games
Using online chat rooms
Downloading images
Gabriella is trying to come up with a strong password for her new online banking account. What would be best for Gabriella to consider when creating the password?
She should use at least one capital letter, one number, one symbol and it should be at least 8 characters long.
She should use her name spelled backwards.
She should use all lowercase letters and one number.
She should use all numbers and capital letters, and contain no more than 6 characters total.
Students have been assigned an account at school they can use to access their grades and update their contact information, including e-mail address. Matteo is trying to come up with a strong password. Which of the following would be the best choice for Matteo to use as a password?
$uperboY1
M@tteo
oettam
matteo123
Mrs. Lee has all of the students in her class hold up their smart phones. She explains that they hold in their hands a big risk to their personal cyber-safety. Why?
Mobile devices contain private information about the owner and must be protected.
Mobile device's content is viewable by the public.
Mobile devices emit tiny amounts of radiation.
Mobile devices are expensive and not needed by students.
Kareem has been gifted a new smart phone. Mrs. Ramirez warns him to be cyber-safe about the apps that he plans on downloading. He is confused. Kareem thought all apps were safe. Mrs Ramirez explains that:
some apps are designed to steal your personal information.
some apps start as free, but then you must pay in order to continue using them.
ome apps are difficult to navigate.
some apps use a lot of system resources.
Rebecca is tired of having to input a password every time she wants to use her smart phone. She disables the password feature because she finds it annoying. What security concerns does Rebecca risk if she loses her smart phone.
Anyone who finds her phone will have access to her personal information.
None, she will get her phone back because someone can use the phone to call her parents
Rebecca's phone will run out of battery because she has the charger at home.
The smart phone can be used to make long-distance phone calls.
Explore all questions with a free account