SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Test your Internet
Security IQ
7/30/20131 Confidential | Copyright 2012 Trend Micro Inc.
It’s important to have a basic
understanding of internet
security in this ever-changing
digital world we live in.
Shannon McCarty Caplan,
Consumer Security Advocate at
Trend Micro created this short
test for consumers to test their
knowledge about staying safe on
the web.
So, are you ready to find out how
much you really know about
internet security?
Start
1. Macs can’t get viruses
.
27/30/2013 Confidential | Copyright 2012 Trend Micro Inc.
Click for answer
B. False
Mac users often feel safe, because traditional
viruses are designed for Windows. However, a
hacker doesn’t care if you have a Mac or PC. A
computer is a computer.
A. True
B. False
Next
Click for answer
2. Which site is more secure?
37/30/2013 Confidential | Copyright 2012 Trend Micro Inc.
B. https://www.Facebook.com
Websites that are safe to enter personal
information begin with https:// instead of http://.
A. http://www.Facebook.com
B. https://www.Facebook.com
Next
Click for answer
3. How can you prevent clicking on
phishing links in your email inbox?
A. Bookmark the sites you regularly use
to shop/bank
B. Don’t ever click on links in your email
inbox, unless you are expecting them
(i.e. you just ordered something online
and received a shipping confirmation
and a tracking number)
C. Move emails that seem like spam to
the junk box so you will never see them
again
D. All of the above
47/30/2013 Confidential | Copyright 2012 Trend Micro Inc.
D. All of the above
Hackers will often spam people’s email with fake emails (that look like real ones from
a store or bank) to lure people to enter personal information. To prevent clicking on
these bad links, bookmark the sites you regularly visit that you know are real. Don’t
ever click on links that you aren’t expecting. If you do get an email that you're not sure
about, directly contact that person or organization. Lastly, when you get something
you know is spam, move it to the junk box right away.
Next
Click for answer
4. If I have antivirus software for my
computer, I can’t get viruses from the
internet.
57/30/2013 Confidential | Copyright 2012 Trend Micro Inc.
B. False
Antivirus software for your computer doesn’t
protect you from viruses you may accidently
acquire from the internet. You can protect yourself
from these viruses only with Internet Security
software.
A. True
B. False
Next
Click for answer
A. Make sure the sites that I
enter personal information
on are legit and secure
B. Don’t use public devices
C. All of the above
D. None of the above
5. You’re sitting in a coffee shop using
the free Wi-Fi. How can you best protect
your personal information?
67/30/2013 Confidential | Copyright 2012 Trend Micro Inc.
D. None of the above
Even if the sites you visit are legit, you should never enter personal information over
a public Wi-Fi connection. Even if you use your personal devices, hackers on the
network can see what you're doing. Avoid doing anything that reveals your personal
information over public Wi-Fi. The most secure way to browse on a public network is
to use a virtual private network or internet security software that validates Wi-Fi
networks and hotspots.
Next
Click for answer
6. Which is the most dangerous category
of websites?
77/30/2013 Confidential | Copyright 2012 Trend Micro Inc.
A. Blogs
B. Porn
C. Entertainment/Music
D. Automotive
E. Business and Economy
A. Blogs
Surprising, right? Cybercriminals often use blogs, primarily as part
of redirection chains that lead to various malware attacks or other
blackhat search engine optimization (SEO) related schemes. Next
Click for answer
7. Updating your browser and operating
system will not help to prevent your
computer from getting a virus or getting
hacked.
87/30/2013 Confidential | Copyright 2012 Trend Micro Inc.
A. True
B. False
B. False
When a browser is outdated, it is gold for hackers. Any
information you enter on outdated browsers is easier to access.
You should always use the latest Web browser version, apply
new operating system updates as soon as they are available,
and install security patches when available.
Next
7/30/2013 9Confidential | Copyright 2012 Trend Micro Inc.
So, how did you do?
As technology advances, there
are more opportunities for
consumers, and unfortunately,
more risks.
To be worry free while browsing
online, Internet Security
Software is highly
recommended.

Weitere ähnliche Inhalte

Andere mochten auch

Visual Studio 2013 - Recursos da IDE
Visual Studio 2013 - Recursos da IDEVisual Studio 2013 - Recursos da IDE
Visual Studio 2013 - Recursos da IDEStefanini
 
Presence Agent y Presence Scripting para personas con limitaciones visuales
Presence Agent y Presence Scripting para personas con limitaciones visualesPresence Agent y Presence Scripting para personas con limitaciones visuales
Presence Agent y Presence Scripting para personas con limitaciones visualesPresence Technology
 
5 Reasons to Recycle in the D.C. Metro Area
5 Reasons to Recycle in the D.C. Metro Area5 Reasons to Recycle in the D.C. Metro Area
5 Reasons to Recycle in the D.C. Metro AreaSims Recycling Solutions
 
Why Consider #FlashStorage in your #DataCenter
Why Consider #FlashStorage in your #DataCenterWhy Consider #FlashStorage in your #DataCenter
Why Consider #FlashStorage in your #DataCenterTegile Systems
 

Andere mochten auch (6)

Visual Studio 2013 - Recursos da IDE
Visual Studio 2013 - Recursos da IDEVisual Studio 2013 - Recursos da IDE
Visual Studio 2013 - Recursos da IDE
 
Presence Agent y Presence Scripting para personas con limitaciones visuales
Presence Agent y Presence Scripting para personas con limitaciones visualesPresence Agent y Presence Scripting para personas con limitaciones visuales
Presence Agent y Presence Scripting para personas con limitaciones visuales
 
5 Reasons to Recycle in the D.C. Metro Area
5 Reasons to Recycle in the D.C. Metro Area5 Reasons to Recycle in the D.C. Metro Area
5 Reasons to Recycle in the D.C. Metro Area
 
Top 10 Business Continuity Disasters
Top 10 Business Continuity DisastersTop 10 Business Continuity Disasters
Top 10 Business Continuity Disasters
 
Why Consider #FlashStorage in your #DataCenter
Why Consider #FlashStorage in your #DataCenterWhy Consider #FlashStorage in your #DataCenter
Why Consider #FlashStorage in your #DataCenter
 
Perceptive Software Scope
Perceptive Software ScopePerceptive Software Scope
Perceptive Software Scope
 

Kürzlich hochgeladen

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Kürzlich hochgeladen (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Test Your Internet Security IQ

  • 1. Test your Internet Security IQ 7/30/20131 Confidential | Copyright 2012 Trend Micro Inc. It’s important to have a basic understanding of internet security in this ever-changing digital world we live in. Shannon McCarty Caplan, Consumer Security Advocate at Trend Micro created this short test for consumers to test their knowledge about staying safe on the web. So, are you ready to find out how much you really know about internet security? Start
  • 2. 1. Macs can’t get viruses . 27/30/2013 Confidential | Copyright 2012 Trend Micro Inc. Click for answer B. False Mac users often feel safe, because traditional viruses are designed for Windows. However, a hacker doesn’t care if you have a Mac or PC. A computer is a computer. A. True B. False Next
  • 3. Click for answer 2. Which site is more secure? 37/30/2013 Confidential | Copyright 2012 Trend Micro Inc. B. https://www.Facebook.com Websites that are safe to enter personal information begin with https:// instead of http://. A. http://www.Facebook.com B. https://www.Facebook.com Next
  • 4. Click for answer 3. How can you prevent clicking on phishing links in your email inbox? A. Bookmark the sites you regularly use to shop/bank B. Don’t ever click on links in your email inbox, unless you are expecting them (i.e. you just ordered something online and received a shipping confirmation and a tracking number) C. Move emails that seem like spam to the junk box so you will never see them again D. All of the above 47/30/2013 Confidential | Copyright 2012 Trend Micro Inc. D. All of the above Hackers will often spam people’s email with fake emails (that look like real ones from a store or bank) to lure people to enter personal information. To prevent clicking on these bad links, bookmark the sites you regularly visit that you know are real. Don’t ever click on links that you aren’t expecting. If you do get an email that you're not sure about, directly contact that person or organization. Lastly, when you get something you know is spam, move it to the junk box right away. Next
  • 5. Click for answer 4. If I have antivirus software for my computer, I can’t get viruses from the internet. 57/30/2013 Confidential | Copyright 2012 Trend Micro Inc. B. False Antivirus software for your computer doesn’t protect you from viruses you may accidently acquire from the internet. You can protect yourself from these viruses only with Internet Security software. A. True B. False Next
  • 6. Click for answer A. Make sure the sites that I enter personal information on are legit and secure B. Don’t use public devices C. All of the above D. None of the above 5. You’re sitting in a coffee shop using the free Wi-Fi. How can you best protect your personal information? 67/30/2013 Confidential | Copyright 2012 Trend Micro Inc. D. None of the above Even if the sites you visit are legit, you should never enter personal information over a public Wi-Fi connection. Even if you use your personal devices, hackers on the network can see what you're doing. Avoid doing anything that reveals your personal information over public Wi-Fi. The most secure way to browse on a public network is to use a virtual private network or internet security software that validates Wi-Fi networks and hotspots. Next
  • 7. Click for answer 6. Which is the most dangerous category of websites? 77/30/2013 Confidential | Copyright 2012 Trend Micro Inc. A. Blogs B. Porn C. Entertainment/Music D. Automotive E. Business and Economy A. Blogs Surprising, right? Cybercriminals often use blogs, primarily as part of redirection chains that lead to various malware attacks or other blackhat search engine optimization (SEO) related schemes. Next
  • 8. Click for answer 7. Updating your browser and operating system will not help to prevent your computer from getting a virus or getting hacked. 87/30/2013 Confidential | Copyright 2012 Trend Micro Inc. A. True B. False B. False When a browser is outdated, it is gold for hackers. Any information you enter on outdated browsers is easier to access. You should always use the latest Web browser version, apply new operating system updates as soon as they are available, and install security patches when available. Next
  • 9. 7/30/2013 9Confidential | Copyright 2012 Trend Micro Inc. So, how did you do? As technology advances, there are more opportunities for consumers, and unfortunately, more risks. To be worry free while browsing online, Internet Security Software is highly recommended.