Cybersecurity and You Flashcards
What is an example of a secure password?
cookiesphynxclosure
What is the benefit of using two-factor authentication (2FA)?
It is more secure because it requires two pieces of evidence to log in.
What is the primary goal of the GDPR and the CCPA?
To protect privacy rights of consumers
You are scrolling through social media and open an article that a friend shared. As you read, you try to determine if this article is legitimate. Which of the following would NOT help you determine if the article is legitimate?
Read through the article (more info, just didn’t get)
What does a Creative Commons license allow creators to do?
Grant specific permissions for others to use their work under certain conditions.
What is another name for an unethical hacker?
Black hat hacker
Posts and other content you post (including the date, application, and version of X) and information about your broadcast activity (e.g., Spaces), including broadcasts you’ve created and when you created them, your lists, bookmarks, and communities you are a part of.Your interactions with other users’ content, such as reposts, likes, bookmarks, shares, replies, if other users mention or tag you in content or if you mention or tag them, and broadcasts you’ve participated in (including your viewing history, listening, commenting, speaking, and reacting).How you interact with others on the platform, such as people you follow and people who follow you, metadata related to Encrypted Messages, and when you use Direct Messages, including the contents of the messages, the recipients, and date and time of messages.If you communicate with us, such as through email, we will collect information about the communication and its content.We collect information on links you interact with across our services (including in our emails sent to you).
Based on the excerpt, which of the following data does X NOT collect?
Your location when you post content.
What is a tradeoff, or a potential negative consequence, of using biometric authentication?
Biometric data is sensitive and raises privacy concerns.
You just purchased a new laptop! As part of the setup, you create your personal admin account as well as a guest account. You give the guest account some permissions while removing others.
What part of the AAA framework does this action fall under?
Authorization
Maria is checking her grades on a school computer in the library, and she forgets to log out before she leaves. Ahmed gets on the computer after her, and he sees her grades for all of her classes.
Which part of the CIA triad was broken?
Confidentiality
Which of the following best defines the internet of things (IoT)?
The interconnection of physical objects that enable them to send and receive data.
How does ransomware typically work?
It encrypts files on a victim’s computer and demands payment for their release.
What is phishing?
A cyberattack that attempts to trick the victim into sharing sensitive information.
What is the purpose of a firewall in preventing malware attacks?
A firewall helps identify and block unauthorized network traffic, reducing the risk of malware infections.
What is one of the potential consequences of a cyberattack on a business?
Loss of revenue.