Review Game Zone
Games
Test
Preview
Back
Match it!
Match it! Select the correct answer from the pull down...Good luck!
Your Instagram account has been hacked and all of your information was leaked. What could have prevented this?
Use a VPN, to securely hide and transfer your data through a remote server
Use a program or website that doesn't require personal information
a complex and lengthy password that makes use of multiple types of characters
Do not open the email and delete it
Two-Factor Authentication
Clicking on a fake website that looks like a real website that was made to trick users into entering their information
Close the page immediately
It may include spyware or a virus. Don't open it and don't click random links attached to suspicious emails.
Which is an example of a phishing attack?
Use a VPN, to securely hide and transfer your data through a remote server
Use a program or website that doesn't require personal information
a complex and lengthy password that makes use of multiple types of characters
Do not open the email and delete it
Two-Factor Authentication
Clicking on a fake website that looks like a real website that was made to trick users into entering their information
Close the page immediately
It may include spyware or a virus. Don't open it and don't click random links attached to suspicious emails.
What are the best ways to protect your data no matter where you are?
Use a VPN, to securely hide and transfer your data through a remote server
Use a program or website that doesn't require personal information
a complex and lengthy password that makes use of multiple types of characters
Do not open the email and delete it
Two-Factor Authentication
Clicking on a fake website that looks like a real website that was made to trick users into entering their information
Close the page immediately
It may include spyware or a virus. Don't open it and don't click random links attached to suspicious emails.
If you receive an anonymous email asking for you to click a link with no explanation, what is the best option?
Use a VPN, to securely hide and transfer your data through a remote server
Use a program or website that doesn't require personal information
a complex and lengthy password that makes use of multiple types of characters
Do not open the email and delete it
Two-Factor Authentication
Clicking on a fake website that looks like a real website that was made to trick users into entering their information
Close the page immediately
It may include spyware or a virus. Don't open it and don't click random links attached to suspicious emails.
When using free wifi, should you……
Use a VPN, to securely hide and transfer your data through a remote server
Use a program or website that doesn't require personal information
a complex and lengthy password that makes use of multiple types of characters
Do not open the email and delete it
Two-Factor Authentication
Clicking on a fake website that looks like a real website that was made to trick users into entering their information
Close the page immediately
It may include spyware or a virus. Don't open it and don't click random links attached to suspicious emails.
Why is it important to not open unknown applications?
Use a VPN, to securely hide and transfer your data through a remote server
Use a program or website that doesn't require personal information
a complex and lengthy password that makes use of multiple types of characters
Do not open the email and delete it
Two-Factor Authentication
Clicking on a fake website that looks like a real website that was made to trick users into entering their information
Close the page immediately
It may include spyware or a virus. Don't open it and don't click random links attached to suspicious emails.
You click on a Facebook post and a web page opens saying that you’ve won a free iPhone. What is the proper course of action?
Use a VPN, to securely hide and transfer your data through a remote server
Use a program or website that doesn't require personal information
a complex and lengthy password that makes use of multiple types of characters
Do not open the email and delete it
Two-Factor Authentication
Clicking on a fake website that looks like a real website that was made to trick users into entering their information
Close the page immediately
It may include spyware or a virus. Don't open it and don't click random links attached to suspicious emails.
Which is the best description of a “strong password?”
Use a VPN, to securely hide and transfer your data through a remote server
Use a program or website that doesn't require personal information
a complex and lengthy password that makes use of multiple types of characters
Do not open the email and delete it
Two-Factor Authentication
Clicking on a fake website that looks like a real website that was made to trick users into entering their information
Close the page immediately
It may include spyware or a virus. Don't open it and don't click random links attached to suspicious emails.
Check it!