Read each statement below and mark either “T” for true or “F” for false. Review the answer sheet to see if you are correct!
- Phishing is the primary attack method used by hackers to gain unauthorized access to information systems and networks. ( T or F )
- Multi-factor authentication should be enabled on apps, online accounts or networks to add an additional layer of data protection. ( T or F )
- Confidential information, such as social security number, protected health information, passwords, should be sent as an attachment in an email. ( T or F )
- Privacy represents “what” must be protected. It covers the collection, use, and disclosure of personal information. Security represents “how” information must be protected. It encompasses the methods for accessing and protecting information. ( T or F )
- There are no federal laws that protect the privacy of student education records. ( T or F )
- You should update your software once a year to restrict access to your files and devices. ( T or F )
- If you receive mail from the Department of Veterans Affairs that belongs to somebody else, you should throw it away. ( T or F )
- Phishers target Veterans for their government-provided aid and benefits via social media scams. ( T or F )
- Ransomware is computer equipment that criminals steal from you and won’t return until you pay them. ( T or F )
- Scammers can use technology to make any name or number show up on your caller ID and steal your information. ( T or F )