1/19
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
A person's digital footprint consists of the following:
I. Comments you leave
II. Pictures you post
III. Topics you search
IV. Apps you use
V. Music you download
VI. Emails you send
I - VI all
True or False. The information about a particular person that exists on the Internet is a result of only a portion of their online activity. Some things don't matter or are not part of a person's digital footprint.
False
Which of the following can help you to maintain your digital footprint?
I. Using privacy settings to limit your exposure
II. Posting long rants when you are angry about something
III. Reviewing posts you are tagged in and taking action if needed
IV. Googling yourself on a regular basis
I, III, and IV
True or False: Cyberbullying can be persistent, permanent and discreet (meaning teachers and parents can't see or overhear cyberbullying).
True
Which of the following statements are true about cyberbullying:
I. Cyberbullying uses electronic communication to bully a person.
II. Cyberbullying is a crime in many states.
III. Instances of cyberbullying do not affect the digital footprint of the victim.
IV. Cyberbullying hurts real people even though we can't always see their reactions online.
I, II, and IV
Victims of cyberbullying may experience which of the following?
Isolation, Low self-esteem, and Depression
True or false: The internet is a great place to socialize, and because it is completely online, everyone is safe.
False
Which of the following are safety guidelines when socializing online?
I. Be wary when communicating with people you don't know in real life
II. Don't disclose personal information-even if it doesn't seem important
III. Don't have any social media accounts
IV. Block/report if you are being harassed
V. Don't send or receive any emails
VI. Ask a trusted adult if you need help
I, II, IV, and VI
Which of the following are best practices for having a secure password?
Creating a password that is long in length, Creating a password that has a combination of letters, numbers, and special characters, and Using a password manager
By checking the box on a privacy policy page, a company can legally use your data and information in all the ways disclosed, no matter what.
False. It depends if the privacy policy allows you to opt in or out of sharing data.
A privacy policy discloses:
How a company uses your data, How a company shares your data, How a company gathers your data
Which of the following describes a credible source?
The domain is .edu
Felipe is trying to find information on wind power in Germany. Which of the following would be the most effective search query for this?
"wind power" +Germany
Which of the following actions will help you avoid violation of copyright laws?
Always cite sources, Check the copyright to make sure it can be used by others without permission, Use public domain media
Which of the following lists the types of copyright license from most restrictive to least restrictive?
All Rights Reserved, Some Rights Reserved, Public Domain
True or False: It is legal to practice hacking public websites as long as you are a student learning about cybersecurity.
False
Which of the following describes an instance of legal hacking?
Penetration testing for a company
What is not true of white hat hackers?
They are breaking the law and are at risk of legal repercussions
Bug Bounty Programs
Companies pay individuals who report vulnerabilities before malicious hackers can exploit them.
Illegal hacking can lead to
Felony charges, Prison time (up to 20 years), and fines (up to $15,000).