Mod 2 Quiz Flashcards

1
Q

While playing an online game, Chris receives a message from another player asking for their full name and home address to send a prize.

Should Chris provide this information?

A

No, because this information is considered direct PII and should be kept private.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How can individuals monetize their own data?

A

By participating in surveys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Jamie is shopping online for a new skateboard using Google Chrome on their favorite skate equipment website. They add a skateboard and other parts to their shopping cart (usually stored in a cookie) but wait until after dinner to finish. After dinner, Jamie uses the Safari browser to complete the purchase. However, upon opening the shopping cart, Jamie finds it empty.

Why is Jamie’s shopping cart empty after switching from Google Chrome to Safari to complete the purchase?

A

Cookies are specific to each browser, so the shopping cart doesn’t carry over.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Alex receives an email from what appears to be his bank, asking him to confirm his account details by clicking on a link and entering his personal information. The email looks official and includes the bank’s logo.

What should Alex do in this situation?

A

Verify the email by contacting his bank using the official contact information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does the Caesar cipher work?

A

By shifting each letter in the alphabet a certain number of spaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a major concern when training artificial intelligence (AI) models?

A

AI can use people’s work without their permission, which can be unfair to the original creators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following contributes the most to making a password the strongest?

A

Length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why are modern encryption methods considered secure?

A

Because they use complex mathematical algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why is SMS texting considered less secure than other forms of communication?

A

It sends messages in plain text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are data brokers?

A

Companies that collect and sell data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the highest risk of keeping your passwords in a document on your computer?

A

The document might get hacked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You want to share information on the internet only when necessary. What can you do to make sure your sensitive personal information is protected?

A

When creating accounts or profiles, set your sensitive information to private.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is ciphertext?

A

Text that has been encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a primary reason websites want you to accept their cookies?

A

To show you more ads based on your interests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why is end-to-end encryption important for instant messaging?

A

It prevents third parties from reading your messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly