Assignment #1 – Test your Cybersecurity Skills Take the below test by answering the questions Created on March 22, 2023 Test Your Cybersecurity Skills Start the quiz & know the results! 1 / 14 What's the term for analyzing public social media data to gather personal info for targeted cyberattacks? Data mining Social engineering Open-source intelligence Digital profiling 2 / 14 What is the primary purpose of the Darknet, a portion of the internet that requires specific software and authorization to access? To facilitate private and anonymous communication and transactions To share funny memes To host official government websites To provide free software downloads 3 / 14 What's the term for fraudulent emails from seemingly trustworthy sources, aimed at stealing sensitive data like login credentials or credit card numbers? Phishing Spoofing Pharming Ransomware 4 / 14 What is the main function of a password manager in the context of digital security? To periodically change passwords for all accounts To generate and store complex, unique passwords securely To automatically log users into their accounts To recover lost passwords for any account 5 / 14 In cybersecurity, what's the term for networked computers used by hackers without the owner's knowledge? Hive Cluster Swarm Botnet 6 / 14 What is the primary purpose of using a Virtual Private Network (VPN)? To store your files securely To increase the speed of your internet connection To protect your computer from viruses To encrypt and secure your internet connection 7 / 14 What method protects sensitive internet-transmitted info from unauthorized interception? Timestamping Watermarking Encryption Compression 8 / 14 What cyber attack involves guessing a password or encryption key through many combinations? MITM attack Brute-force attack Phishing attack DDoS attack 9 / 14 Why is it important to be cautious about the permissions requested by mobile apps? Some apps may request unnecessary permissions to access sensitive information or device features Apps with more permissions take up more storage space on the device Granting permissions consumes additional battery life Excessive permissions can slow down the device's performance 10 / 14 What is the term used to describe a type of malware that encrypts a victim's files or data, and then demands payment (usually in cryptocurrency) to restore access? Ransomware Adware Spyware Scareware 11 / 14 Which term refers to a scam where criminals impersonate a business or individual over the phone to obtain sensitive information or persuade the victim to act? Whaling Pharming Vishing Smishing 12 / 14 Which example is a social engineering technique for manipulating people to reveal sensitive info or perform actions? Pretexting Anonymizing Firewall evasion Encryption 13 / 14 What should you do if you receive a suspicious email from someone claiming to be your bank, asking for personal information? Forward the email to your friends Delete the email and contact your bank directly Reply with the requested information Click on any links provided in the email 14 / 14 Why is it important to avoid using public Wi-Fi networks for sensitive tasks, such as online banking? Public Wi-Fi networks charge high fees for usage Public Wi-Fi networks are often less secure and can expose your data to hackers Public Wi-Fi networks are slow Public Wi-Fi networks are always monitored by the government Your score is 0% Restart quiz