Week 9 Activity
Week 9 Activity
Kalibo, Aklan
1. Alani downloads a game called Kandy Krush from the app store. The app prompts her to enter her
Social Security number (SSN) before playing. Alani asks her friend for advice. Which advice should
her friend give? *
a) "Only enter your SSN if the app is using an encrypted connection."
b) "Your SSN isn't private information, so you can go ahead and enter it."
c) "Only enter your SSN if you're playing the game on your home wireless network; don't enter
it while you're on public WiFi networks."
d) "The game shouldn't need your SSN to be playable; don't enter it."
2. Bailey uploads a video of their neighborhood to YouTube. In what way could the uploaded video be
used as PII?
a) The size of the houses can indicate where Bailey lives.
b) The length of the video can help indicate how much time Bailey spends on YouTube.
c) The quality of the video can help indicate the type of phone Bailey has.
d) The street addresses could help locate where Bailey lives.
3. In 2014, Yahoo suffered a data breach that exposed details of at least 500 million user accounts, giving
attackers access to real names, email addresses, dates of birth, and telephone numbers. With access to
that information, which of these actions could be taken by an attacker?
a) They could sell the user's Social Security numbers to another attacker on the Internet.
b) They could hack into a user's computer and access their file systems.
c) They could post users' home addresses on a public social media account.
d) They could spend spam messages to a user's mobile phone.
e) They could email a user with a threat to reveal private information.
4. Each of these users has a different strategy to manage their passwords across websites. Which user's
strategy is the strongest?
a) For each site, Brooke starts with the password "alm0ndj0y99" and then appends the domain
name, like "alm0ndj0y99khanacademy" for Khan Academy.
b) Pablo uses a password manager to generate strong passwords for each site. Their master
password is an initialism, "iw2bacsMjrw1g2c!", based on their life goal ("I want to be a CS
major when I go to college").
c) Palavi uses a password manager to generate strong passwords for each site. Their
d) master password is the same as the password for their computer, "b@ckfl1ppin'!".
e) For each site, Aisha finds three words on the home page and combines them into a password,
Northwestern Visayan Colleges
Kalibo, Aklan
6. How can attackers access a user account protected by two-factor authentication (2FA)?
a) It's possible for an attacker to break into an account secured with two-factor authentication,
but only if they have access to both factors.
b) As long as an account is secured with two-factor authentication, there is no way for attackers
to break into it.
c) If one of the factors is a password, the user account can only be hacked if the user came up
with a weak password.
d) If an attacker can gain access to just one of the factors used in two-factor authentication, and
then they can break into the account.