Digital Safety and Security Awareness: Final Assessment Answers



Digital Safety and Security Awareness: Final Assessment Answers

Understanding digital safety and security is essential in today’s interconnected world. This final assessment is designed to evaluate your awareness of key cybersecurity concepts, digital hygiene practices, and responsible online behavior. Whether you’re a student, IT professional, or simply a digital citizen aiming to stay informed, these questions and answers will help reinforce your knowledge and prepare you to navigate the digital landscape with confidence.

1. Why are social security numbers useful to cybercriminals?

  • They can help them to commit identity theft
  • They reduce the probability of detection
  • They provide improved financial stability
  • They can use them to fake utility bills

2. What is the main downside of being constantly connected?

  • We exploit each other’s behavior
  • We send more phishing emails
  • We are constantly at risk
  • We are less aware of malware

3. Previously unknown vulnerabilities in software or hardware are open to what?

  • Credential stuffing
  • Social engineering
  • Ransomware
  • Zero-day exploits

4. What disguises itself as legitimate software in order to disrupt data?

  • Pharming
  • A Trojan Horse
  • Spyware
  • Adware

5. Why might someone use Qustodio?

  • To access gaming forums
  • To share school names and addresses
  • To monitor children’s online activities
  • As a deterrent for cyberbullies

6. How do potential employers get a sense of a person’s character?

  • By removing their endorsements
  • By making controversial comments
  • By fostering their sense of maturity
  • By looking at social media

7. What are GANs?

  • Government administration networks
  • Generational adjustment networks
  • Genre altering networkers
  • Generative adversarial networks

8. The promotion of body positivity and the challenging of traditional beauty standards are positive outcomes of what?

  • Carefully edited and filtered versions of reality
  • Curated content and influencers’ lifestyle goals
  • The trap of unrealistic expectations and comparisons
  • Greater diversity and representation on social media

9. When companies use social media to present themselves as environmentally friendly and responsible, it is known as what?

  • Greenwashing
  • False narrative
  • Digital activism
  • Misinformation

10. What is 2FA?

  • Two-factor attacks
  • Two-factor authentication
  • Two-factor activity
  • Two-factor access

11. If attackers hijack your phone and intercept messages and calls, you’re a victim of what?

  • Firewalls
  • Ransomware
  • Phishing
  • SIM swapping

12. How can you secure your home network?

  • By enabling remote management features
  • By changing the default password on your router
  • By removing your VPN’s unique password
  • By canceling the guest network for visitors

13. Why has privacy become a growing concern for digital technology users?

  • Because surveillance technologies have become more sophisticated and widespread
  • Because users can access vast amounts of government data which influences public opinion
  • Because targeted advertising relies on the pervasive nature of surveillance technology
  • Because marketing now goes far beyond simple data collection for surveillance purposes

14. What can happen if you participate in online piracy?

  • You can be led into the dark web unknowingly
  • You can become more digitally literate
  • You can develop dark web misconceptions
  • You lose half of your two-factor authentication

15. What can address vulnerabilities, add new features, and improve stability?

  • Restarting your firmware
  • Determining your router’s model
  • Manufacturers’ updates
  • Removing a critical point of security

16. What is another name for web beacons?

  • Tracking pixels
  • Site cookies
  • Profile fingerprints
  • Data points

17. How can you protect your stored personal data from unauthorized access?

  • By deleting bookmarks and downloads
  • By clearing saved browser settings
  • By closing your virtual private network
  • By using the tools tab in your browser

18. How can you learn what data is collected and how it is shared?

  • By reviewing your privacy policies
  • By reassessing your security settings
  • By reviewing promotional offers
  • By using a location tracking app

19. A weather app asking for access to your contact list is an example of what?

  • A red flag
  • A premium service
  • Greenwashing
  • Minimal information

20. The internet produces a similar level of global carbon emissions to which of these sectors?

  • Agriculture
  • Airline
  • Fashion
  • Energy

21. In what way do many people share content on social media?

  • Based on immediate emotional reactions
  • With a mindful approach to its value
  • After careful evaluation of its veracity
  • With thoughtful engagement in mind

22. What is digital detox?

  • Designated tech-free time
  • Positive, uplifting content
  • The cause of digital burnout
  • Reduced sleep disturbance

23. What is e-waste?

  • The electronic contents of your recycle bin
  • The recycling of old gadgets
  • The disposal of old electronic devices
  • Your level of digital consumption

24. What can easily happen while we’re scrolling through endless content?

  • We break our routines
  • We lose track of time
  • It helps us to focus
  • Our online personas strengthen

25. How can blue light affect us?

  • It can alleviate information overload
  • It can reduce decision fatigue levels
  • It can increase melatonin production
  • It can disrupt our natural sleep patterns

26. Snopes and PolitiFact are examples of what?

  • Sensationalist sources
  • Government watchdogs
  • Incredible outlets
  • Fact-checking websites

27. When considering truth in the media landscape, it’s important to remember what?

  • Facts can offer valuable perspectives
  • Opinions should reflect verifiable events
  • Opinions are not the same as facts
  • Opinions can be scientifically demonstrated

28. A complex set of rules that determine what content we see is known as what?

  • An algorithm
  • Personalization
  • A feedback loop
  • The cycle of misinformation

29. How can we balance our online lives with satisfaction and well-being?

  • By recognizing the varying levels of poor posture, eye strain, stress and anxiety
  • By being grateful for the countless conveniences that digital technology can offer us
  • By making adjustments to the apps we use to monitor our sleep, fitness, and energy levels
  • With offline activities such as reading, walking, or time spent with friends and family

30. Actively engaging with technology can promote what?

  • Learning and growth
  • New habits
  • Better algorithms
  • Predefined rules

31. Reputation damage often results in what?

  • Difficulty in regaining customers’ trust
  • Hefty fines plus legal fees
  • Having one’s identity stolen
  • Professional embarrassment and stress

32. Why does credential stuffing have such a far-reaching impact?

  • It can cripple online services, leading to downtime and lost revenue
  • Because people often reuse passwords across multiple sites
  • Because the vulnerabilities it exploits are often unknown
  • It makes use of various psychological manipulation techniques

33. How can a digital footprint be positive for young people?

  • It teaches them how to develop foolproof privacy settings
  • It can help them to develop their sense of identity and maturity
  • It can protect them from the public backlash suffered by celebrities
  • Their positive contributions leave a lasting impression that benefits them

34. A strong password typically includes what?

  • A symbol and a number that are not too difficult to remember
  • An authentication code to confirm your identity
  • A mix of upper and lower case letters, numbers and characters
  • An effective mix of personal and random information

35. What is a fake hotspot?

  • A type of software used to copy passwords
  • A guest network created just for visitors
  • An app that disables remote management
  • An insecure network created by scammers