Mod 2 Tech + Flashcards
What should you do if you receive a suspicious email asking for personal information?
Ignore and delete the email.
How can individuals monetize their own data?
By participating in surveys
Why is it important to review the privacy policy of a social media platform?
To understand how your data is used
What should you do if you receive an unexpected email with an attachment?
Verify the sender before opening the attachment.
Which of the following is a benefit of using a password manager?
It stores and encrypts your passwords securely.
For a school project, you create a website that collects names and email addresses from your classmates. One of your classmates asks you to delete their information.
What should you do to respect their privacy?
Delete their information as they requested.
Which law focuses on protecting health information in the United States?
HIPAA
What is a good practice when creating a password?
Include uppercase letters, lowercase letters, numbers, and symbols
Which of the following is considered Direct PII?
Full Name
What is the main risk of using a password manager?
Master password is compromised
What is PII?
Personally Identifiable Information
What is the highest risk of keeping your passwords in a document on your computer?
The document might get hacked
Sarah loves sharing photos of her daily life on social media. One day, she receives a friend request from someone she doesn’t know. The person’s profile looks interesting, and they have many mutual friends. Sarah is unsure whether to accept the request.
What should Sarah do to protect her privacy?
Investigate the person’s profile and ask mutual friends before deciding.
Which of the following contributes the most to making a password the strongest?
Length
What is the main purpose of data privacy rules?
To keep people’s private information safe
What is a Virtual Private Network (VPN) used for?
To create a secure connection over the Internet
Which of the following is a common protocol for encrypting data in transit?
HTTPS
What does the California Consumer Privacy Act (CCPA) allow people living in California to do?
See what personal information companies collect about them
If you use the same password on multiple sites and one site gets hacked, what should you do?
Change your password on all sites.
Why are modern encryption methods considered secure?
Because they use complex mathematical algorithms
What is data in transit?
Data that is being transferred over a network
What is encryption?
A way to make data unreadable to unauthorized people
What is data at rest?
Data that is saved and not currently being used
Why should you be cautious about participating in social media quizzes and games?
They can collect personal data.