CyberSecurity 2016 Diagnostic Assessment
Teacher and Period
Mr. Rodriguez - Period 1
Mr. Rodriguez - Period 2
Mr. Rodriguez - Period 3
Mr. Colley - Period 1
Mr. Colley - Period 2
Mr. Colley - Period 3
Ms. Noelcin - Period 1
Ms. Noelcin - Period 2
Ms. Noelcin- Period 3
Mr. Cuccolo - Period 1
Mr. Cuccolo - Period 2
Mr. Cuccolo - Period 3
Mr. Perez - Period 1
Mr. Perez - Period 2
Mr. Perez - Period 3
Mr. Bevilacqua - Period 1
Mr. Bevilacqua - Period 2
Mr. Bevilacqua - Period 3
Ms. Atkinson-Jones - Period 1
Ms. Atkinson-Jones - Period 2
Ms. Atkinson-Jones - Period 3
1. Jay loves music so much that he plans to become a music producer when he goes to college. Yesterday, he found a web site where he downloaded songs recently released for sale. He heard that downloading music for free without the permission of the company is illegal. What law would he break if he downloaded music from this site?
Software Piracy and Intellectual Property Theft
Online Securities Fraud
2. Which of the following is NOT a Cyber Ethics Commandment?
Thou shalt not use a computer to harm other people.
Thou shalt not snoop around in other people's computer files.
Thou shalt not ask for permission to copy or use proprietary software for which you have not paid.
Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans.
3. A hacker is a person that is...
an expert at programming and solving problems with a computer
a person who gains access to a computer system without permission
someone who seeks and exploits weaknesses in a computer system
All of the above
4. Which of the following offers the best choice to prevent cyber bullying?
Never open unidentified or unsolicited messages, keep photos posted "PG," always log out of online accounts after you are done using them, and set up privacy controls.
Never open messages (emails, text messages, Facebook messages, etc.) from people you don’t know.
Start a movement, create a club, build a campaign, or host an event to bring awareness to cyberbullying.
Never leave passwords or other identifying information where others can see it.
5. What is a computer network?
Interconnected computers or devices
An internet service provider
People that work together on computer programs
6. What can you trust to be secure 100 percent of the time?
None of the Above
7. While visiting your favorite website for downloading the Firefox browser, a popup appears that says “You just won 100,000 US dollars! Click this link to claim your prize”, what should you do?
Ignore that popup and just download the Firefox browser.
Click the popup and claim your prize.
Report the popup and the details to the website administrator and don’t download the Firefox browser.
Share the link to your friends, classmates and colleagues so that they could also claim the prize because sharing is caring.
8. You came across a website that looks exactly like Facebook but it has a different domain which you have never heard of, which of the following is the best course of action that should be taken?
Launch DDoS (Distributed Denial of Service) attacks into that website with the help of your friends if you can’t hack it in order to take it offline then post it in Facebook or Twitter. #TangoDown!
Do not login into that website and report it as a phishing page to Google Safe Browsing Team –
Just ignore that website and login to
9. Which of the following is a good netiquette?
Do not use all caps when replying to emails or when commenting.
Use internet slang when replying to a chat or a comment.
Always login to websites that have SSL or HTTPS.
All of the above
10. A customer service representative has just called you saying that your credit card is about to expire, and he or she is asking for you to verify your personal information to verify your account and to renew your credit card without telling you from what bank he or she came from. What should you do?
Ask the customer representative what bank or company he or she came from.
Verify your credit card if it really expired because expiration dates are placed on credit cards.
Don’t give out your personal information and credit card information if you don’t have enough information about the customer service representative or about the bank.
11. You went to McDonald's to buy breakfast and decide to connect to their Free WIFI. While browsing to your Google Mail (
), the page redirects to
. What do you think should you do?
Login to where Google Mail has redirected, it’s just one of Google’s web sites – not suspicious at all.
Ask the person sitting next to you if his Google Mail also redirects to
Disconnect from McDonald's Network immediately.
Watch the following video, and answer questions #12 and #13.
12. According to the video above, what type of data do cookies store?
login data and personal preferences
information about the size of your computer's hard drive
information stored in other cookies
13. What is an example of being affected by cookies?
Ads from online shopping sites you've visited may pop up when you are online.
You get a virus on your computer.
14. Which of these is a Cyber Principle?
15. Think of
. What principle was used in the visual design of the website?
16. When you pilot a drone from an iPad, you use the drone app. If the app crashes, you are still able to use other apps or restart the drone app. This is an example of which principle?
17. Many computers are built with parts that can easily be taken out and replaced with other parts. This makes it easier to troubleshoot and fix. Which principle does this description belong to?
Resources used for this assessment include:
Never submit passwords through Google Forms.
This form was created inside of Essex County Vocational Schools.
Terms of Service