Question: 1

By checking the box on a privacy policy page, a company can legally use your data and information in all the ways disclosed, even if you change your settings.

True. This is always the case.

True. Changing your settings does not affect the privacy policy.

False. It depends if the privacy policy allows you to opt in or out of sharing data.

False. Companies do not give you the option to update your settings.

Question: 2
What is not true of white hat hackers?

They contribute to robust security systems

They use the same methods as black hat hackers

They alert companies of security vulnerabilities

They are breaking the law and are at risk of legal repercussions

Question: 3
Which of the following pieces of information would be safe to include in an online username?

School mascot

Favorite sport

Year of birth

City of residence

Question: 4
True or False: As long as you cite your source, you are free to use or share any kind of media you find on the Internet.

True

False

Question: 5
A person’s digital footprint is:

Public, but not usually permanent

Only public to people whom a person shares things with, but what’s there is permanent

Public and permanent to anyone

Question: 6
Which of the following people can access your digital footprint?

A. Teachers, colleges, and scholarship committees
B. Potential employers
C. Family, friends, and acquaintances

A only

A and B only

C only

A,B, and C

Question: 7
You purchased a new smartphone that can accept a PIN of up to six characters. For maximum security, what should you do?

Use a four character PIN because it’s easier to remember.

Change your PIN to a new six-character PIN.

Repeat the last character of your old four-character PIN to create a new six-character PIN.

Disable encryption.

Question: 8
You have asked your users to avoid using passwords that use letters only. Which of the following policies would help enforce this?

Password complexity requirements

Enforce password history

Minimum password length

Maximum password age.

Question: 9
It’s time to change passwords again and you don’t feel like entering a brand-new password. You use an old password you used last year, but it is rejected. What policy is most likely preventing you from reusing it?

Password complexity

Password history

Password expiration

Maximum attempts

Question: 10
Which of the following represents an example of a special character?

0

&

G

s

Question: 11
Anne Smith is creating a screen name for her video game account. To ensure personal safety, which is the best screen name choice of the following?

Her information is as follows:

Name: Anne Smith
Birthday: 12/13/2001
Address: 465 Marbury Lane, Chicago, IL 60603

ASmith2001

AnnieSGamer121301

AnneS60603

ASGamer12

ASChicago01

Question: 12
Which creative commons license is the least restrictive?

CC BY (Attribution)

CC BY-SA (Attribution-ShareAlike)

CC BY-NC-ND (Attribution-NonCommercial-NoDerivs)

CC BY-NC (Attribution-NonCommercial)

Question: 13
Which instances are considered illegal hacking?

A. White hat hacking
B. Hacktivism
C. Penetration testing
D. Bug bounty program
E. Hacking just for fun

All choices shown are illegal.

B, C, D, and E

B and E

C, D, and E

Question: 14
You find an image with the copyright license shown. Which action is permitted?

You can use the image for commercial purposes if you credit the owner.

You can use the image without crediting the owner.

You can use and modify the image for non-commercial purposes if you credit the owner.

You can modify and use the image without crediting the owner.

1 answer

Here are the answers to your questions:

Question 1:
False. It depends if the privacy policy allows you to opt in or out of sharing data.

Question 2:
They are breaking the law and are at risk of legal repercussions. (White hat hackers operate legally and ethically, so this statement is not true of them.)

Question 3:
School mascot. (It's not sensitive information like the other options.)

Question 4:
False. (Citing your source does not automatically give you permission to use or share any media; copyright laws still apply.)

Question 5:
Public and permanent to anyone. (Your digital footprint can often be seen by anyone and can persist over time.)

Question 6:
A, B, and C. (All the mentioned parties can access your digital footprint.)

Question 7:
Change your PIN to a new six-character PIN. (Maximizes security compared to easier options.)

Question 8:
Password complexity requirements. (This would enforce the use of different character types.)

Question 9:
Password history. (This policy prevents reuse of old passwords.)

Question 10:
& (This is an example of a special character.)

Question 11:
ASGamer12 (This does not include identifiable information like birthdates or address.)

Question 12:
CC BY (Attribution) (This license is the least restrictive as it simply requires attribution.)

Question 13:
B and E (These are considered illegal hacking activities.)

Question 14:
You can use and modify the image for non-commercial purposes if you credit the owner. (This aligns with certain Creative Commons licenses that impose these conditions.)