Watch the video and choose the choice that answers the question:
1) What is the primary message of Jen Easterly's presentation?
Answer:
A
B
C
D
A) Highlighting the importance of Cybersecurity Awareness Month and promoting basic cybersecurity practices.
B) Introducing the latest advancements in cybersecurity technology.
C) Discussing the challenges faced by CISA in securing digital infrastructure.
D) Outlining the role of international partners in combating cyber threats.
2) According to Jen Easterly, what are the four simple steps everyone can take to stay safe online?
Answer:
A
B
C
D
A) Enable VPN, encrypt data, use biometric authentication, and update software.
B) Use strong passwords, enable automatic updates, recognize phishing attempts, and report suspicious activities.
C) Install firewalls, conduct regular backups, avoid public Wi-Fi, and enable multi-factor authentication.
D) Implement blockchain technology, use secure sockets layer (SSL), enable GPS tracking, and create data silos.
3) What is emphasized as a crucial practice to prevent falling victim to phishing attempts?
Answer:
A
B
C
D
A) Being quick to respond to unsolicited emails or texts.
B) Clicking on links from unknown sources to verify their legitimacy.
C) Sharing personal information over the phone if requested.
D) Exercising caution and thinking before clicking on links or opening attachments.
4) According to Jen Easterly, what is the recommended action regarding software updates?
Answer:
A
B
C
D
A) Regularly check for updates manually.
B) Disable automatic updates to avoid interruptions.
C) Ignore software update notifications to prevent system slowdown.
D) Enable automatic updates to ensure devices are continuously up to date with the latest security patches.
5) Who is invited to participate in Cybersecurity Awareness Month 2023, according to Jen Easterly?
Answer:
A
B
C
D
A) Only government agencies and large corporations.
B) Exclusively tech providers and software developers.
C) Families, small and medium businesses, tech providers, government, international partners, and others.
D) Solely individuals with expertise in cybersecurity.
Check
OK