Which of the following actions will you take to avoid or remove Spyware from your computer system?
Which one of the following is not harmful to your computer?
Which of the following actions can maximize the chances of a user’s computer becoming infected by malware?
Which of the following actions will NOT help you minimize the risk of other people accessing your information?
If you suspect that you’ve responded to a phishing scam with personal or financial information, which of the following step should be taken to minimize any damage and protect your identity?
What can you do to protect your privacy on a social network?
Cybersecurity involves protecting information by:
What are some of the examples of changes that could indicate that someone has accessed your information:
Which of the following should you not do on a social network?
Why can email attachments be dangerous?
Which of the following are potential hazards faced by social networkers
A Trojan (or Trojan horse) is a malicious program that pretends to be a benign application. It is designed to cause your computer to do something that is unexpected. Since it does not spread (not self-replicating) it is not really a virus.
Malware can be classified in several ways, including on the basis of how it is spread, how it is executed and/or what it does. The main types of malware include worms, viruses, Trojans, backdoors, spyware, rootkits and spam.
Spyware can make changes to your computer that can be annoying and can cause your computer slow down or crash.
Once software is installed on your computer, you do not have to worry about it anymore.
Using anti-virus and anti-spyware software is not an important part of cyber security
Screen scraping is the act of taking all the information that a person has posted on their Web site or social networking page.
Most social networks have a variety of privacy settings you can configure to hide some or all of your personal information from some or all of the site’s members
Computer viruses and Trojan Horses are the two most common forms of Malware.
To create strong passwords include using:
Social Networking provides several different ways for people to communicate with one another, including through personal web pages with photos and video, blogs, message boards, and instant messaging features.
___________ are small software programs that are designed to spread from one computer to another and to interfere with computer operation
________ is the electronic version of “junk mail.”
Phishing is an attempt to get information such as passwords, user names, and financial details by masquerading as a trusted source, using some form of electronic communication. Often the imposter poses as a trusted source from popular social websites, banks, or government agencies
Hi there! Click one of our representatives below and we will get back to you as soon as possible.