0% found this document useful (0 votes)
676 views

Week 9 Activity

This document contains a test completed by a student named Joemil A. Nam-Ay for their Living in the IT Era class. The test has multiple choice questions about information security topics like personally identifiable information (PII), data breaches, password management, multi-factor authentication, and examples of direct and indirect identification. It tests the student's understanding of privacy risks online and best practices for protecting personal information.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
676 views

Week 9 Activity

This document contains a test completed by a student named Joemil A. Nam-Ay for their Living in the IT Era class. The test has multiple choice questions about information security topics like personally identifiable information (PII), data breaches, password management, multi-factor authentication, and examples of direct and indirect identification. It tests the student's understanding of privacy risks online and best practices for protecting personal information.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Northwestern Visayan Colleges

Kalibo, Aklan

Living in the IT Era (GE 8)


Week 9 - Activity

NAME: JOEMIL A. NAM-AY YEAR&SECTION: BEED-IIIA


Test I. Multiple Choice (2 points each)

1. Alani downloads a game called Kandy Krush from the app store. The app prompts her to enter her
Social Security number (SSN) before playing. Alani asks her friend for advice. Which advice should
her friend give? *
a) "Only enter your SSN if the app is using an encrypted connection."
b) "Your SSN isn't private information, so you can go ahead and enter it."
c) "Only enter your SSN if you're playing the game on your home wireless network; don't enter
it while you're on public WiFi networks."
d) "The game shouldn't need your SSN to be playable; don't enter it."

2. Bailey uploads a video of their neighborhood to YouTube. In what way could the uploaded video be
used as PII?
a) The size of the houses can indicate where Bailey lives.
b) The length of the video can help indicate how much time Bailey spends on YouTube.
c) The quality of the video can help indicate the type of phone Bailey has.
d) The street addresses could help locate where Bailey lives.

3. In 2014, Yahoo suffered a data breach that exposed details of at least 500 million user accounts, giving
attackers access to real names, email addresses, dates of birth, and telephone numbers. With access to
that information, which of these actions could be taken by an attacker?
a) They could sell the user's Social Security numbers to another attacker on the Internet.
b) They could hack into a user's computer and access their file systems.
c) They could post users' home addresses on a public social media account.
d) They could spend spam messages to a user's mobile phone.
e) They could email a user with a threat to reveal private information.

4. Each of these users has a different strategy to manage their passwords across websites. Which user's
strategy is the strongest?
a) For each site, Brooke starts with the password "alm0ndj0y99" and then appends the domain
name, like "alm0ndj0y99khanacademy" for Khan Academy.
b) Pablo uses a password manager to generate strong passwords for each site. Their master
password is an initialism, "iw2bacsMjrw1g2c!", based on their life goal ("I want to be a CS
major when I go to college").
c) Palavi uses a password manager to generate strong passwords for each site. Their
d) master password is the same as the password for their computer, "b@ckfl1ppin'!".
e) For each site, Aisha finds three words on the home page and combines them into a password,
Northwestern Visayan Colleges
Kalibo, Aklan

Living in the IT Era (GE 8)


Week 9 - Activity
like "academy-learn-free" for Khan Academy.

5. Which statements are true about multi-factor authentication?


Note that there are 2 answers to this question. Choose 2 answers.
a) MFA requires the user to reveal PII in order to authenticate.
b) MFA adds an additional level of security to the authentication process.
c) MFA requires evidence from at least two authentication factors.
d) MFA adds a layer of encryption to online authentication.

6. How can attackers access a user account protected by two-factor authentication (2FA)?
a) It's possible for an attacker to break into an account secured with two-factor authentication,
but only if they have access to both factors.
b) As long as an account is secured with two-factor authentication, there is no way for attackers
to break into it.
c) If one of the factors is a password, the user account can only be hacked if the user came up
with a weak password.
d) If an attacker can gain access to just one of the factors used in two-factor authentication, and
then they can break into the account.

7. Which of these combinations of evidence would count as two-factor authentication?

a) The card verification value (CVV) on a credit card


A numeric code generated by a USB token

b) A scan of the user's retina


The user's thumbprint

c) A number generated by a user's mobile application


The name of the user's first grade teacher

d) The user's password


An address where the user once lived

Test II. Give at least 4 examples of Direct Identification.


1. Drivers License
2. Postal ID
3. Birth Certificate
4. School ID
Northwestern Visayan Colleges
Kalibo, Aklan

Living in the IT Era (GE 8)


Week 9 - Activity

Test III. Give at least 4 examples of Indirect Identification.


5. Pang- itan Madalag, Aklan
6. Roman Catholic
7. Healthy
8. College Graduate

You might also like