SlideShare une entreprise Scribd logo
1  sur  9
Test your Internet
Security IQ
7/30/20131 Confidential | Copyright 2012 Trend Micro Inc.
It’s important to have a basic
understanding of internet
security in this ever-changing
digital world we live in.
Shannon McCarty Caplan,
Consumer Security Advocate at
Trend Micro created this short
test for consumers to test their
knowledge about staying safe on
the web.
So, are you ready to find out how
much you really know about
internet security?
Start
1. Macs can’t get viruses
.
27/30/2013 Confidential | Copyright 2012 Trend Micro Inc.
Click for answer
B. False
Mac users often feel safe, because traditional
viruses are designed for Windows. However, a
hacker doesn’t care if you have a Mac or PC. A
computer is a computer.
A. True
B. False
Next
Click for answer
2. Which site is more secure?
37/30/2013 Confidential | Copyright 2012 Trend Micro Inc.
B. https://www.Facebook.com
Websites that are safe to enter personal
information begin with https:// instead of http://.
A. http://www.Facebook.com
B. https://www.Facebook.com
Next
Click for answer
3. How can you prevent clicking on
phishing links in your email inbox?
A. Bookmark the sites you regularly use
to shop/bank
B. Don’t ever click on links in your email
inbox, unless you are expecting them
(i.e. you just ordered something online
and received a shipping confirmation
and a tracking number)
C. Move emails that seem like spam to
the junk box so you will never see them
again
D. All of the above
47/30/2013 Confidential | Copyright 2012 Trend Micro Inc.
D. All of the above
Hackers will often spam people’s email with fake emails (that look like real ones from
a store or bank) to lure people to enter personal information. To prevent clicking on
these bad links, bookmark the sites you regularly visit that you know are real. Don’t
ever click on links that you aren’t expecting. If you do get an email that you're not sure
about, directly contact that person or organization. Lastly, when you get something
you know is spam, move it to the junk box right away.
Next
Click for answer
4. If I have antivirus software for my
computer, I can’t get viruses from the
internet.
57/30/2013 Confidential | Copyright 2012 Trend Micro Inc.
B. False
Antivirus software for your computer doesn’t
protect you from viruses you may accidently
acquire from the internet. You can protect yourself
from these viruses only with Internet Security
software.
A. True
B. False
Next
Click for answer
A. Make sure the sites that I
enter personal information
on are legit and secure
B. Don’t use public devices
C. All of the above
D. None of the above
5. You’re sitting in a coffee shop using
the free Wi-Fi. How can you best protect
your personal information?
67/30/2013 Confidential | Copyright 2012 Trend Micro Inc.
D. None of the above
Even if the sites you visit are legit, you should never enter personal information over
a public Wi-Fi connection. Even if you use your personal devices, hackers on the
network can see what you're doing. Avoid doing anything that reveals your personal
information over public Wi-Fi. The most secure way to browse on a public network is
to use a virtual private network or internet security software that validates Wi-Fi
networks and hotspots.
Next
Click for answer
6. Which is the most dangerous category
of websites?
77/30/2013 Confidential | Copyright 2012 Trend Micro Inc.
A. Blogs
B. Porn
C. Entertainment/Music
D. Automotive
E. Business and Economy
A. Blogs
Surprising, right? Cybercriminals often use blogs, primarily as part
of redirection chains that lead to various malware attacks or other
blackhat search engine optimization (SEO) related schemes. Next
Click for answer
7. Updating your browser and operating
system will not help to prevent your
computer from getting a virus or getting
hacked.
87/30/2013 Confidential | Copyright 2012 Trend Micro Inc.
A. True
B. False
B. False
When a browser is outdated, it is gold for hackers. Any
information you enter on outdated browsers is easier to access.
You should always use the latest Web browser version, apply
new operating system updates as soon as they are available,
and install security patches when available.
Next
7/30/2013 9Confidential | Copyright 2012 Trend Micro Inc.
So, how did you do?
As technology advances, there
are more opportunities for
consumers, and unfortunately,
more risks.
To be worry free while browsing
online, Internet Security
Software is highly
recommended.

Contenu connexe

En vedette (6)

Visual Studio 2013 - Recursos da IDE
Visual Studio 2013 - Recursos da IDEVisual Studio 2013 - Recursos da IDE
Visual Studio 2013 - Recursos da IDE
 
Presence Agent y Presence Scripting para personas con limitaciones visuales
Presence Agent y Presence Scripting para personas con limitaciones visualesPresence Agent y Presence Scripting para personas con limitaciones visuales
Presence Agent y Presence Scripting para personas con limitaciones visuales
 
5 Reasons to Recycle in the D.C. Metro Area
5 Reasons to Recycle in the D.C. Metro Area5 Reasons to Recycle in the D.C. Metro Area
5 Reasons to Recycle in the D.C. Metro Area
 
Top 10 Business Continuity Disasters
Top 10 Business Continuity DisastersTop 10 Business Continuity Disasters
Top 10 Business Continuity Disasters
 
Why Consider #FlashStorage in your #DataCenter
Why Consider #FlashStorage in your #DataCenterWhy Consider #FlashStorage in your #DataCenter
Why Consider #FlashStorage in your #DataCenter
 
Perceptive Software Scope
Perceptive Software ScopePerceptive Software Scope
Perceptive Software Scope
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

Test Your Internet Security IQ

  • 1. Test your Internet Security IQ 7/30/20131 Confidential | Copyright 2012 Trend Micro Inc. It’s important to have a basic understanding of internet security in this ever-changing digital world we live in. Shannon McCarty Caplan, Consumer Security Advocate at Trend Micro created this short test for consumers to test their knowledge about staying safe on the web. So, are you ready to find out how much you really know about internet security? Start
  • 2. 1. Macs can’t get viruses . 27/30/2013 Confidential | Copyright 2012 Trend Micro Inc. Click for answer B. False Mac users often feel safe, because traditional viruses are designed for Windows. However, a hacker doesn’t care if you have a Mac or PC. A computer is a computer. A. True B. False Next
  • 3. Click for answer 2. Which site is more secure? 37/30/2013 Confidential | Copyright 2012 Trend Micro Inc. B. https://www.Facebook.com Websites that are safe to enter personal information begin with https:// instead of http://. A. http://www.Facebook.com B. https://www.Facebook.com Next
  • 4. Click for answer 3. How can you prevent clicking on phishing links in your email inbox? A. Bookmark the sites you regularly use to shop/bank B. Don’t ever click on links in your email inbox, unless you are expecting them (i.e. you just ordered something online and received a shipping confirmation and a tracking number) C. Move emails that seem like spam to the junk box so you will never see them again D. All of the above 47/30/2013 Confidential | Copyright 2012 Trend Micro Inc. D. All of the above Hackers will often spam people’s email with fake emails (that look like real ones from a store or bank) to lure people to enter personal information. To prevent clicking on these bad links, bookmark the sites you regularly visit that you know are real. Don’t ever click on links that you aren’t expecting. If you do get an email that you're not sure about, directly contact that person or organization. Lastly, when you get something you know is spam, move it to the junk box right away. Next
  • 5. Click for answer 4. If I have antivirus software for my computer, I can’t get viruses from the internet. 57/30/2013 Confidential | Copyright 2012 Trend Micro Inc. B. False Antivirus software for your computer doesn’t protect you from viruses you may accidently acquire from the internet. You can protect yourself from these viruses only with Internet Security software. A. True B. False Next
  • 6. Click for answer A. Make sure the sites that I enter personal information on are legit and secure B. Don’t use public devices C. All of the above D. None of the above 5. You’re sitting in a coffee shop using the free Wi-Fi. How can you best protect your personal information? 67/30/2013 Confidential | Copyright 2012 Trend Micro Inc. D. None of the above Even if the sites you visit are legit, you should never enter personal information over a public Wi-Fi connection. Even if you use your personal devices, hackers on the network can see what you're doing. Avoid doing anything that reveals your personal information over public Wi-Fi. The most secure way to browse on a public network is to use a virtual private network or internet security software that validates Wi-Fi networks and hotspots. Next
  • 7. Click for answer 6. Which is the most dangerous category of websites? 77/30/2013 Confidential | Copyright 2012 Trend Micro Inc. A. Blogs B. Porn C. Entertainment/Music D. Automotive E. Business and Economy A. Blogs Surprising, right? Cybercriminals often use blogs, primarily as part of redirection chains that lead to various malware attacks or other blackhat search engine optimization (SEO) related schemes. Next
  • 8. Click for answer 7. Updating your browser and operating system will not help to prevent your computer from getting a virus or getting hacked. 87/30/2013 Confidential | Copyright 2012 Trend Micro Inc. A. True B. False B. False When a browser is outdated, it is gold for hackers. Any information you enter on outdated browsers is easier to access. You should always use the latest Web browser version, apply new operating system updates as soon as they are available, and install security patches when available. Next
  • 9. 7/30/2013 9Confidential | Copyright 2012 Trend Micro Inc. So, how did you do? As technology advances, there are more opportunities for consumers, and unfortunately, more risks. To be worry free while browsing online, Internet Security Software is highly recommended.