BUY HERE: IFSM 201 Quiz 5 (UMUC) – Homeworkmade
IFSM 201 Quiz 5 (UMUC)
Question 1
Points: 10 out of 10
Would this incident be an example of social engineering?
Finding a music CD on the subway and playing it on your computer
1. Yes
2. No
Question 2
Points: 0 out of 10
Would this incident be an example of social engineering?
You are working as a receptionist at a real estate company. You receive a phone call from one of the agents who asks for the email address of another agent he needs to contact.
1. Social engineering
2. Not social engineering
Question 3
Points: 0 out of 10
Would this incident be an example of social engineering?
Someone calling to get your full name for an event registration
1. Yes
2. No
Question 4
Points: 10 out of 10
True or false? Malware problems and other compromises of your computer information are rare.
1. True
2. False
Question 5
Points: 10 out of 10
Would this incident be an example of social engineering?
You receive a phone call from the technical support department of a software maker alerting you to a bug in the company’s software, which you have purchased. The tech offers to walk you through the steps required to fix the software on your computer.
1. Social engineering
2. Not social engineering
Question 6
Points: 10 out of 10
Which of the following is generally not considered PII?
1. Your driver license number
2. Your bank account number
3. Your library card number
4. Your social security number
Question 7
Points: 10 out of 10
Can the following action be a result of your PII being compromised?
Having your identity stolen
1. Yes
2. No
Question 8
Points: 10 out of 10
Which of the following measures is least likely to help you protect your PII?
1. Logging off or shutting down your computer when it’s not in use
2. Locking your computer in the back of your car knowing that your car has an alarm
3. Keeping the “remember me” button checked on a social networking site
Question 9
Points: 10 out of 10
Identify whether the following actions pose a risk of becoming a phishing victim or do not pose a risk. Ann receives an email telling here that a friend has sent her an electronic greeting card. She clicks on a rather long url to retrieve the card.
1. Risk of becoming a phishing victim
2. Not a risk of becoming a phishing victim
Question 10
Points: 10 out of 10
Indicate whether the following actions are the actions of a person who will be a victim, or will not be a victim, of phishing attacks.
Clicking on a link to the URL https://www.g00gle.com
1. Phishing victim
2. Not a phishing victim
Question 11
Points: 10 out of 10
Which of the following email scenarios is more likely than the others to involve phishing?
1. An email sent to multiple recipients
2. An email from someone you know
3. An email containing a clickable url
4. An email that goes to your email program’s spam folder
Question 12
Points: 10 out of 10
Identify whether the following actions pose a risk of becoming a phishing victim or do not pose a risk. Using a computer in his college’s open lab, Oscar orders a textbook he needs from an online vendor by typing in their url, and he uses his credit card to pay for the order.
1. Risk of becoming a phishing victim
2. Not a risk of becoming a phishing victim
Question 13
Points: 10 out of 10
For the following scenario, indicate whether the actions are good practices or bad practices to safeguard your personally identifiable information.
Marina’s personal computer requires a password to get access.
1. Good practice
2. Bad practice
Question 14
Points: 10 out of 10
For the following scenario, indicate whether the actions are good practices or bad practices to safeguard your personally identifiable information.
Anthony has spent time developing a super secure password. He now uses it for all his accounts.
1. Good practice
2. Bad practice
Question 15
Points: 10 out of 10
You receive an email whose title line looks suspicious. Which of the following actions is the safest?
1. Clicking an “unsubscribe’ link in the email
2. Deleting the email without opening
3. Googling the site the email is coming from
4. Putting the site in your spam filter rules so you don’t receive any more emails
No comments:
Post a Comment