2. Phishing and Software Privacy
1) What is phishing?
a) scams through websites
b) scams through emails
c) scams through phone calls
d) scams through text messages
2) Sara finds a message on her phone that she thinks might be a scam. She should:
a) Forward the message to her friends to see if they think it's a scam too.
b) Reply and ask the sender not to send more mail.
c) Inform authoruties
d) Delete the message.
3) When people send you phony emails, pop-up messages, social media messages,
texts, calls, or links to fake websites in order to hook you into giving out your
personal and financial information is?
a) Plagiarizing
b) Skimming
c) Phishing
d) Identity Theft
4) Teens are some of the most frequent targets of identity theft and other scams.
Why?
a) Identity thieves look for “clean” Social Security numbers that haven’t yet
been used to get credit.
b) Thieves want to help teens get student loans for college
c) It will help teens do better in school
3. d) Identity thieves are just testing teens to see if they will fall for their scamsuni.
5) They may get into your computer or another computer system, including schools, credit card
companies, and other places maintaining personal information.Its called?
a) Hoping
b) Heaving
c)Hacking
d) Heckling
6) What is used to prevent identity theft use one of these on credit card, bank and cell phone
accounts?
a) Combination lock
b) Password
c) A piece of tape to cover up the number
d) A fake name
7) What is a phishing scam?
a) Someone trying to log your keys
b) YOU SPELLED FISHING WRONG SIR!
c) Someone sending you a virus
d) Someone pretending to be a legitimate business
8) What is the most common way to receive a phishing scam?
a) Text message
b) Email
c) Downloading films
d) Unsafe wesbites
9) Which is NOT a phishing feature?
a) sense of urgency
b) addressed to you
c) link to website
d) generic greeting
10) Phishing is?
a) using a fishing pole to catch fish.
4. b) luring someone into giving out private information.
c) pretending to be someone you're not.
d) being at high risk of attack or harm
11) If you receive a message that your computer has a virus, you should?
a) download the fix immediately!
b) be suspicious because they can't tell if your computer has a virus.
c) send them your credit card information right away to get help!
12) ----- deals with the protection of an individual’s information which is
implemented while using the Internet on any computer or personal device.
a) Digital agony
b) Digital privacy
c) Digital secrecy
d) Digital protection
13) Which of the following do not comes under the three pillars of digital privacy?
a) Information privacy
b) Individual privacy
c) Communication privacy
d) Family privacy
14) Which of the following is not an appropriate solution for preserving privacy?
a) Use privacy-focussed SE
b) Close all logical ports
c) Do not use malicious sites and torrent sites
5. d) Use VPN
15) Which of the following is not a private Search-engine?
a) Yahoo
b) DuckDuckGo
c) StartPage
d) Wolfram Alpha
16) Which of the following browser is used for Privacy purpose?
a) Chrome
b) Firefox
c) Opera
d) Tor
17) The data transferred between your device & the server is securely _____________
if you’re using VPNs.
a) locked
b) sealed
c) packed
d) encrypted
18) The ____________ transferred between your device & the server is securely
encrypted if you are using VPNs.
a) data
b) virus
c) music files