0% found this document useful (0 votes)
12 views2 pages

123

The document provides guidelines for protecting personal information online, including not responding to unsolicited emails and reporting them as phishing. It emphasizes the importance of strong passwords, using a VPN on public Wi-Fi, enabling two-factor authentication, and regularly backing up data. Additional recommendations include using firewalls, avoiding suspicious downloads, and employing ad-blocking extensions to mitigate malware risks.

Uploaded by

a3212663062
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views2 pages

123

The document provides guidelines for protecting personal information online, including not responding to unsolicited emails and reporting them as phishing. It emphasizes the importance of strong passwords, using a VPN on public Wi-Fi, enabling two-factor authentication, and regularly backing up data. Additional recommendations include using firewalls, avoiding suspicious downloads, and employing ad-blocking extensions to mitigate malware risks.

Uploaded by

a3212663062
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Question: What is the recommended action if you receive an unsolicited email

asking for your personal information or account details?


Answer: Do not provide any personal information and report the email as
phishing.
4. Question: Which type of attack involves an attacker attempting to gain
unauthorized access by trying numerous password combinations?
Answer: Brute force attack
5. Question: What security measure can help protect your personal
information when using public Wi-Fi networks?
Answer: Using a Virtual Private Network (VPN)
Question: What should you do if you suspect that your account has been
compromised by a hacker?
Answer: Change your password immediately
. Question: What is the best practice for creating strong and secure
passwords?
Answer: Using a combination of letters, numbers, and special characters;
avoiding easily guessable information like birthdays or pet names.
Information on the Internet is open. Unless your information is
protected, hackers can view your information at any time, but you can protect
your information through various means.For example, if a stranger sends you
an email asking for your personal information or account details, you can
report the email as phishing to prevent more people from being scammed.You
can also set a strong password to ensure the security of your account.
Strongly encrypted passwords generally use a combination of letters,
numbers, and special characters.Using a virtual private network when using
public Wi-Fi can change your network port number and IP address, giving
hackers a virtual location and making it harder for hackers to find your
location.You can also use a firewall to block hacker attacks. Avoid downloading
files from unknown sources and suspicious links, and use ad-blocking and
script-blocking browser extensions to reduce the risk of malware infection.
Regularly back up important data to an external hard drive, cloud storage, or
other secure location. Enable two-factor authentication to protect using a
password and a second method of verifying your account.

Information on the Internet is open. Unless your information is protected,


hackers can view your information at any time, but you can protect your
information through various means.For example, if a stranger sends you an
email asking for your personal information or account details, you can report
the email as phishing to prevent more people from being scammed.
You can also set a strong password to ensure the security of your account.
Strongly encrypted passwords generally use a combination of letters,
numbers, and special characters. Enable two-factor authentication to protect
using a password and a second method of verifying your account.
Using a virtual private network when using public Wi-Fi can change your
network port number and IP address, giving hackers a virtual location and
making it harder for hackers to find your location.You can also use a firewall to
block hacker attacks. Avoid downloading files from unknown sources and
suspicious links, and use ad-blocking and script-blocking browser extensions
to reduce the risk of malware infection. Regularly back up important data to
an external hard drive, cloud storage, or other secure location.

You might also like