Viruses, worms, and Trojan horses are all examples of ______________.
D. Spyware
A. Filters
B. Malware
C. Pets that can be seen in a zoo
Malware that is spread through security warnings or advertisements for antivirus software is known as ______________.
B. Download files from public newsgroups
A. Cyber-snooping
D. Phishing
C. Scareware
When you respond to an email from your bank that asks you to verify your account information, you may become a victim of a ___________ scam.
C. Troll
A. Cyber-stalking
B. Phishing
__________ can be added to your computer to track your browsing activity and preferences.
C. Trojans
D. Downloads
A. Cookies
B. Flamebaits
Which of the following is NOT a method you would use to verify that you are on a secure site for financial transactions?
C. Checking the SSL Certificate
D. Checking the cache for encryption
A. Making sure the address begins with https:
B. Looking for the "Lock" security symbol
If you want to protect your identity while social networking, then you might use a(n) ____________ for your profile image.
D. Avatar
A. Driver's License
Heated online arguments that occur in posts and chats are known as ______________.
C. Flame wars
A. Clickjacking
B. Cyber-yell
Which of the following is NOT a safe method for using a mobile device while driving?
C. Only use one hand when texting
D. Suspend conversations in hazardous conditions
B. Dial before you pull out into traffic
A. Do not take photos
Answers:
- 1) B. Malware
- 2) C. Scareware
- 3) B. Phishing
- 4) A. Cookies
- 5) D. Checking the cache for encryption
- 6) D. Avatar
- 7) C. Flame wars
- 8) C. Only use one hand when texting