Mod 2 Tech + Flashcards

1
Q

What should you do if you receive a suspicious email asking for personal information?

A

Ignore and delete the email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How can individuals monetize their own data?

A

By participating in surveys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why is it important to review the privacy policy of a social media platform?

A

To understand how your data is used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What should you do if you receive an unexpected email with an attachment?

A

Verify the sender before opening the attachment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is a benefit of using a password manager?

A

It stores and encrypts your passwords securely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

For a school project, you create a website that collects names and email addresses from your classmates. One of your classmates asks you to delete their information.

What should you do to respect their privacy?

A

Delete their information as they requested.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which law focuses on protecting health information in the United States?

A

HIPAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a good practice when creating a password?

A

Include uppercase letters, lowercase letters, numbers, and symbols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is considered Direct PII?

A

Full Name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the main risk of using a password manager?

A

Master password is compromised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is PII?

A

Personally Identifiable Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the highest risk of keeping your passwords in a document on your computer?

A

The document might get hacked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Sarah loves sharing photos of her daily life on social media. One day, she receives a friend request from someone she doesn’t know. The person’s profile looks interesting, and they have many mutual friends. Sarah is unsure whether to accept the request.

What should Sarah do to protect her privacy?

A

Investigate the person’s profile and ask mutual friends before deciding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following contributes the most to making a password the strongest?

A

Length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the main purpose of data privacy rules?

A

To keep people’s private information safe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Virtual Private Network (VPN) used for?

A

To create a secure connection over the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following is a common protocol for encrypting data in transit?

A

HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does the California Consumer Privacy Act (CCPA) allow people living in California to do?

A

See what personal information companies collect about them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

If you use the same password on multiple sites and one site gets hacked, what should you do?

A

Change your password on all sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Why are modern encryption methods considered secure?

A

Because they use complex mathematical algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is data in transit?

A

Data that is being transferred over a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is encryption?

A

A way to make data unreadable to unauthorized people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is data at rest?

A

Data that is saved and not currently being used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Why should you be cautious about participating in social media quizzes and games?

A

They can collect personal data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Alex receives an email from what appears to be his bank, asking him to confirm his account details by clicking on a link and entering his personal information. The email looks official and includes the bank’s logo.

What should Alex do in this situation?

A

Verify the email by contacting his bank using the official contact information.

26
Q

Which of the following actions should you avoid to stay safe when using AI models?

A

Uploading photos to AI facial recognition services without considering privacy

27
Q

What is two-factor authentication (2FA)?

A

Using a password and a second form of verification like a smartphone

28
Q

What should you do if you hear about a data breach at a company where you have an account?

A

Change your password immediately

29
Q

Why is end-to-end encryption important for instant messaging?

A

It prevents third parties from reading your messages.

30
Q

What is the role of algorithms in targeted advertising?

A

To analyze data and select relevant ads for users.

31
Q

Which of the following should you avoid when creating a password? (Select two.)

A

Using only dictionary words
Sharing your password in case you forget it

32
Q

You are using a virtual assistant device in your home to perform tasks such as finding out the weather forecast, playing music, and controlling other IoT devices. Sometimes, you notice that the device activates and starts listening without your voice command. You suspect that the device might be recording sensitive and personal information.

Which of the following is the BEST solution to this issue?

A

Set the device Privacy settings to Don’t Save Recordings.

33
Q

Who usually owns the data you share on social media platforms?

A

The social media platform

34
Q

Why is it important to be cautious with personal details that seem harmless on the Internet?

A

They can be combined to create a complete profile of your identity.

35
Q

Why is encrypting data at rest sometimes more complicated than encrypting data in transit?

A

Because the encryption keys must be kept secure for a longer period of time

36
Q

Why is SMS texting considered less secure than other forms of communication?

A

It sends messages in plain text.

37
Q

Where is the BEST place to store a physical notebook containing passwords?

A

In a locked drawer or safe

38
Q

How do AI models gather information to learn?

A

By searching the Internet and using various methods and programs

39
Q

Which regulation is designed to protect the personal data of European Union residents?

A

GDPR

40
Q

What are data brokers?

A

Companies that collect and sell data

41
Q

What is a major concern when training artificial intelligence (AI) models?

A

AI can use people’s work without their permission, which can be unfair to the original creators.

42
Q

Which of the following should you avoid when sharing sensitive files?

A

FTP

43
Q

What is an example of Indirect PII?

A

Postal code or ZIP code

44
Q

What is ciphertext?

A

Text that has been encrypted

45
Q

Are cookies shared between different web browsers?

A

No, cookies are specific to each browser.

46
Q

What is artificial intelligence (AI)?

A

A machine that can solve problems and create new content mostly on its own

47
Q

How does the Caesar cipher work?

A

By shifting each letter in the alphabet a certain number of spaces

48
Q

What is targeted advertising?

A

Using your data to show ads for products you might like

49
Q

Jamie is shopping online for a new skateboard using Google Chrome on their favorite skate equipment website. They add a skateboard and other parts to their shopping cart (usually stored in a cookie) but wait until after dinner to finish. After dinner, Jamie uses the Safari browser to complete the purchase. However, upon opening the shopping cart, Jamie finds it empty.

Why is Jamie’s shopping cart empty after switching from Google Chrome to Safari to complete the purchase?

A

Cookies are specific to each browser, so the shopping cart doesn’t carry over.

50
Q

What is a primary reason websites want you to accept their cookies?

A

To show you more ads based on your interests

51
Q

Which of the following are small text files that allow websites to save information about you and how you’re using their platform?

A

Cookies

52
Q

What is a password manager?

A

A tool that helps you create and store multiple passwords securely.

53
Q

Which of the following is NOT a privacy issue that is related to using a social networking site?

A

You need to ensure that private information is physically shredded prior to disposal.

54
Q

What is targeted marketing?

A

A method where companies show ads for things they think you’ll like based on the data they collect about you

55
Q

You want to share information on the internet only when necessary. What can you do to make sure your sensitive personal information is protected?

A

When creating accounts or profiles, set your sensitive information to private.

56
Q

Why might a company choose to encrypt only certain types of data?

A

To save money and resources

57
Q

What search engine focuses on user privacy and does not collect or store your personal information?

A

DuckDuckGo

58
Q

Why is it important to change default usernames and passwords on devices?

A

Because they are the same for many devices of the same model

59
Q

While playing an online game, Chris receives a message from another player asking for their full name and home address to send a prize.

Should Chris provide this information?

A

No, because this information is considered direct PII and should be kept private.

60
Q

What can companies offer if their data gets breached?

A

Free year of credit monitoring

61
Q

Michael is setting up a new router at home. The router comes with no password set by default.

What should Michael do to secure his network?

A

Set a strong password immediately.