1.
Some websites require you to fill out information online before you can access their sites. What should you consider before you provide any information?
Correct Answer
B. Whether providing the information requested will reveal private identity information.
Explanation
Before providing any information online, it is important to consider whether the information requested will reveal private identity information. This includes personal details such as name, address, phone number, social security number, or any other sensitive information that could potentially be used for identity theft or fraud. It is crucial to be cautious and only provide such information on trusted and secure websites to protect oneself from potential risks and unauthorized access to personal data.
2.
What are some examples of private identity information?
Correct Answer
D. E-Mail address, pHone number, full name.
Explanation
The examples of private identity information in this question are e-mail address, phone number, and full name. These pieces of information are considered private because they are personal and can be used to identify an individual. Sharing such information with others can potentially lead to privacy breaches or identity theft.
3.
What are some examples of personal information?
Correct Answer
B. Hair color, favorite food, first name.
Explanation
The examples given in the answer - hair color, favorite food, and first name - are all examples of personal information. Personal information refers to any information that can be used to identify or describe an individual. Hair color and first name are specific to an individual and can be used to distinguish them from others. Favorite food is also personal information as it reflects an individual's preferences and choices.
4.
Kids do not have to worry about identity theft, this is only a problem among adults.
Correct Answer
B. False
Explanation
This statement is false because kids can also be victims of identity theft. While it may be more common among adults, children can still have their personal information stolen and used fraudulently. In fact, children's identities are often targeted because they have clean credit histories and the theft can go unnoticed for a longer period of time. Therefore, it is important for parents and guardians to take steps to protect children's personal information and educate them about the risks of identity theft.
5.
What is the purpose of passwords?
Correct Answer
A. To protect accounts from being used by others and having private identity information stolen.
Explanation
Passwords are used to protect accounts from unauthorized access and prevent private identity information from being stolen. By requiring a password, only the person who knows the correct password can access the account, ensuring that it remains secure and confidential. This helps to safeguard personal information, such as financial details, sensitive documents, and private communications, from falling into the wrong hands. Passwords act as a barrier, ensuring that only the rightful owner of the account can access and control it, thereby enhancing security and privacy.
6.
Computers, online accounts and cell phones are examples of technology that can sometimes require passwords.
Correct Answer
A. True
Explanation
Computers, online accounts, and cell phones are widely used technologies that often require passwords for security purposes. Passwords are used to protect personal information, prevent unauthorized access, and ensure privacy. This is especially important in today's digital age where cyber threats are prevalent. Therefore, it is true that these technologies can sometimes require passwords.
7.
Its ok to give a password to a friend as long as you trust that person.
Correct Answer
B. False
Explanation
Sharing a password with a friend, even if you trust that person, is not recommended. Passwords should be kept confidential and not shared with anyone, as it increases the risk of unauthorized access to personal accounts or sensitive information. Sharing passwords can also lead to potential misuse or security breaches, as the friend may inadvertently disclose the password to others or use it inappropriately. It is always advisable to keep passwords private and not share them with anyone, regardless of trust.
8.
It is important that you choose a password that can be found in the dictionary.
Correct Answer
B. False
Explanation
Choosing a password that can be found in the dictionary is not recommended as it makes it easier for hackers to guess the password using dictionary-based attacks. A strong password should be unique, complex, and not easily guessable to enhance the security of personal accounts and information.
9.
Which of the below is NOT an example of a good password security tip.
Correct Answer
B. Never change your password.
Explanation
The given answer, "Never change your password," is not an example of a good password security tip. Regularly changing passwords is a recommended practice to enhance security and minimize the risk of unauthorized access. By changing passwords periodically, users can mitigate the chances of their accounts being compromised and protect their personal information.
10.
Logan is trying to create a safe, secure password for his email account. Can you choose the most secure password from the list below for him?
Correct Answer
D. Lgn1234##
Explanation
The most secure password from the given options is "lgn1234##". This password includes a combination of lowercase and uppercase letters, numbers, and special characters. It is also longer than the other options, which makes it harder to guess or crack. Using a mix of different characters and avoiding common words or personal information helps enhance the security of the password.