No student devices needed. Know more
10 questions
When a social media friend request is received from someone that isn’t familiar, what is the best way to proceed?
Be cautious and take appropriate steps to verify the identity.
Check for common connections and accept/reject based on that.
Look at the picture to decide if this is trustworthy person.
Accept it right away, there's no harm from virtual friends.
You receive a message from your favorite social media platform, indicating your account has been compromised. You need to immediately click a link to enter a new password and secure your account. What is this message likely to be?
This is a phishing attack attempting to get you to take an action.
This is legitimate message from your social media platform.
This is social engineering trying to get you to install malware.
This is likely a prank message from a friend trying to fool you.
The initial privacy and security settings for most social media platforms:
Fail to adequately safeguard user information from others.
Sufficiently protect most users from unwanted intrusion.
Offer guidance on the types of information that should be shared.
Only share sensitive and confidential information with friends.
What is the goal of most social media based attacks?
Get the victim to enable geotagging.
Get the victim to send a friend request.
Get the victim to take an action.
Get the victim to respond to a message.
What is the critical question you should always ask before sharing information on social media?
Will sharing this information increase possible sales?
Is this information that really needs to be shared?
Will this information increase my popularity ranking?
How will friends and customers react to this information?
Submit
The only person with whom you should ever share your password is:
Your spouse.
Your manager.
Your trusted co-worker.
The IT admin or tech support person.
No one.
What is the most important thing to do if you suspect a security incident?
Attempt to investigate and mitigate yourself.
Report it immediately.
Call 911.
Immediately pull your computer's power plug from the socket.
What are three proven practices for safeguarding your identity and privacy?
Using strong, unique passwords for every account.
Avoiding most websites.
Not clicking so fast and taking time to examine a message thoroughly before responding or clicking.
Keeping devices up to date with recent software releases.
Setting your social media profiles to public.
Which of the following best describes a human firewall?
Someone who always follows policy and reports every security incident.
Someone who keeps tabs on their co-workers to make sure they are following policy.
Someone who shows up to work on time and doesn't fall victim to cyber attacks.
Someone who never ask questions for fear of being perceived as ignorant.
Someone who is technically competent.
You have received an email from an acquaintance requesting sensitive information, what should you do?
Contact the sender in person or by phone.
Reply to the email since you know the sender.
Forward some personal questions to confirm the sender's identify.
Explore all questions with a free account