SlideShare una empresa de Scribd logo
1 de 9
Test your Internet
Security IQ
7/30/20131 Confidential | Copyright 2012 Trend Micro Inc.
It’s important to have a basic
understanding of internet
security in this ever-changing
digital world we live in.
Shannon McCarty Caplan,
Consumer Security Advocate at
Trend Micro created this short
test for consumers to test their
knowledge about staying safe on
the web.
So, are you ready to find out how
much you really know about
internet security?
Start
1. Macs can’t get viruses
.
27/30/2013 Confidential | Copyright 2012 Trend Micro Inc.
Click for answer
B. False
Mac users often feel safe, because traditional
viruses are designed for Windows. However, a
hacker doesn’t care if you have a Mac or PC. A
computer is a computer.
A. True
B. False
Next
Click for answer
2. Which site is more secure?
37/30/2013 Confidential | Copyright 2012 Trend Micro Inc.
B. https://www.Facebook.com
Websites that are safe to enter personal
information begin with https:// instead of http://.
A. http://www.Facebook.com
B. https://www.Facebook.com
Next
Click for answer
3. How can you prevent clicking on
phishing links in your email inbox?
A. Bookmark the sites you regularly use
to shop/bank
B. Don’t ever click on links in your email
inbox, unless you are expecting them
(i.e. you just ordered something online
and received a shipping confirmation
and a tracking number)
C. Move emails that seem like spam to
the junk box so you will never see them
again
D. All of the above
47/30/2013 Confidential | Copyright 2012 Trend Micro Inc.
D. All of the above
Hackers will often spam people’s email with fake emails (that look like real ones from
a store or bank) to lure people to enter personal information. To prevent clicking on
these bad links, bookmark the sites you regularly visit that you know are real. Don’t
ever click on links that you aren’t expecting. If you do get an email that you're not sure
about, directly contact that person or organization. Lastly, when you get something
you know is spam, move it to the junk box right away.
Next
Click for answer
4. If I have antivirus software for my
computer, I can’t get viruses from the
internet.
57/30/2013 Confidential | Copyright 2012 Trend Micro Inc.
B. False
Antivirus software for your computer doesn’t
protect you from viruses you may accidently
acquire from the internet. You can protect yourself
from these viruses only with Internet Security
software.
A. True
B. False
Next
Click for answer
A. Make sure the sites that I
enter personal information
on are legit and secure
B. Don’t use public devices
C. All of the above
D. None of the above
5. You’re sitting in a coffee shop using
the free Wi-Fi. How can you best protect
your personal information?
67/30/2013 Confidential | Copyright 2012 Trend Micro Inc.
D. None of the above
Even if the sites you visit are legit, you should never enter personal information over
a public Wi-Fi connection. Even if you use your personal devices, hackers on the
network can see what you're doing. Avoid doing anything that reveals your personal
information over public Wi-Fi. The most secure way to browse on a public network is
to use a virtual private network or internet security software that validates Wi-Fi
networks and hotspots.
Next
Click for answer
6. Which is the most dangerous category
of websites?
77/30/2013 Confidential | Copyright 2012 Trend Micro Inc.
A. Blogs
B. Porn
C. Entertainment/Music
D. Automotive
E. Business and Economy
A. Blogs
Surprising, right? Cybercriminals often use blogs, primarily as part
of redirection chains that lead to various malware attacks or other
blackhat search engine optimization (SEO) related schemes. Next
Click for answer
7. Updating your browser and operating
system will not help to prevent your
computer from getting a virus or getting
hacked.
87/30/2013 Confidential | Copyright 2012 Trend Micro Inc.
A. True
B. False
B. False
When a browser is outdated, it is gold for hackers. Any
information you enter on outdated browsers is easier to access.
You should always use the latest Web browser version, apply
new operating system updates as soon as they are available,
and install security patches when available.
Next
7/30/2013 9Confidential | Copyright 2012 Trend Micro Inc.
So, how did you do?
As technology advances, there
are more opportunities for
consumers, and unfortunately,
more risks.
To be worry free while browsing
online, Internet Security
Software is highly
recommended.

Más contenido relacionado

Destacado (6)

Visual Studio 2013 - Recursos da IDE
Visual Studio 2013 - Recursos da IDEVisual Studio 2013 - Recursos da IDE
Visual Studio 2013 - Recursos da IDE
 
Presence Agent y Presence Scripting para personas con limitaciones visuales
Presence Agent y Presence Scripting para personas con limitaciones visualesPresence Agent y Presence Scripting para personas con limitaciones visuales
Presence Agent y Presence Scripting para personas con limitaciones visuales
 
5 Reasons to Recycle in the D.C. Metro Area
5 Reasons to Recycle in the D.C. Metro Area5 Reasons to Recycle in the D.C. Metro Area
5 Reasons to Recycle in the D.C. Metro Area
 
Top 10 Business Continuity Disasters
Top 10 Business Continuity DisastersTop 10 Business Continuity Disasters
Top 10 Business Continuity Disasters
 
Why Consider #FlashStorage in your #DataCenter
Why Consider #FlashStorage in your #DataCenterWhy Consider #FlashStorage in your #DataCenter
Why Consider #FlashStorage in your #DataCenter
 
Perceptive Software Scope
Perceptive Software ScopePerceptive Software Scope
Perceptive Software Scope
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Test Your Internet Security IQ

  • 1. Test your Internet Security IQ 7/30/20131 Confidential | Copyright 2012 Trend Micro Inc. It’s important to have a basic understanding of internet security in this ever-changing digital world we live in. Shannon McCarty Caplan, Consumer Security Advocate at Trend Micro created this short test for consumers to test their knowledge about staying safe on the web. So, are you ready to find out how much you really know about internet security? Start
  • 2. 1. Macs can’t get viruses . 27/30/2013 Confidential | Copyright 2012 Trend Micro Inc. Click for answer B. False Mac users often feel safe, because traditional viruses are designed for Windows. However, a hacker doesn’t care if you have a Mac or PC. A computer is a computer. A. True B. False Next
  • 3. Click for answer 2. Which site is more secure? 37/30/2013 Confidential | Copyright 2012 Trend Micro Inc. B. https://www.Facebook.com Websites that are safe to enter personal information begin with https:// instead of http://. A. http://www.Facebook.com B. https://www.Facebook.com Next
  • 4. Click for answer 3. How can you prevent clicking on phishing links in your email inbox? A. Bookmark the sites you regularly use to shop/bank B. Don’t ever click on links in your email inbox, unless you are expecting them (i.e. you just ordered something online and received a shipping confirmation and a tracking number) C. Move emails that seem like spam to the junk box so you will never see them again D. All of the above 47/30/2013 Confidential | Copyright 2012 Trend Micro Inc. D. All of the above Hackers will often spam people’s email with fake emails (that look like real ones from a store or bank) to lure people to enter personal information. To prevent clicking on these bad links, bookmark the sites you regularly visit that you know are real. Don’t ever click on links that you aren’t expecting. If you do get an email that you're not sure about, directly contact that person or organization. Lastly, when you get something you know is spam, move it to the junk box right away. Next
  • 5. Click for answer 4. If I have antivirus software for my computer, I can’t get viruses from the internet. 57/30/2013 Confidential | Copyright 2012 Trend Micro Inc. B. False Antivirus software for your computer doesn’t protect you from viruses you may accidently acquire from the internet. You can protect yourself from these viruses only with Internet Security software. A. True B. False Next
  • 6. Click for answer A. Make sure the sites that I enter personal information on are legit and secure B. Don’t use public devices C. All of the above D. None of the above 5. You’re sitting in a coffee shop using the free Wi-Fi. How can you best protect your personal information? 67/30/2013 Confidential | Copyright 2012 Trend Micro Inc. D. None of the above Even if the sites you visit are legit, you should never enter personal information over a public Wi-Fi connection. Even if you use your personal devices, hackers on the network can see what you're doing. Avoid doing anything that reveals your personal information over public Wi-Fi. The most secure way to browse on a public network is to use a virtual private network or internet security software that validates Wi-Fi networks and hotspots. Next
  • 7. Click for answer 6. Which is the most dangerous category of websites? 77/30/2013 Confidential | Copyright 2012 Trend Micro Inc. A. Blogs B. Porn C. Entertainment/Music D. Automotive E. Business and Economy A. Blogs Surprising, right? Cybercriminals often use blogs, primarily as part of redirection chains that lead to various malware attacks or other blackhat search engine optimization (SEO) related schemes. Next
  • 8. Click for answer 7. Updating your browser and operating system will not help to prevent your computer from getting a virus or getting hacked. 87/30/2013 Confidential | Copyright 2012 Trend Micro Inc. A. True B. False B. False When a browser is outdated, it is gold for hackers. Any information you enter on outdated browsers is easier to access. You should always use the latest Web browser version, apply new operating system updates as soon as they are available, and install security patches when available. Next
  • 9. 7/30/2013 9Confidential | Copyright 2012 Trend Micro Inc. So, how did you do? As technology advances, there are more opportunities for consumers, and unfortunately, more risks. To be worry free while browsing online, Internet Security Software is highly recommended.