zuai-logo

What is the importance of protecting PII?

Protecting PII is crucial to prevent identity theft and other harms.

Flip to see [answer/question]
Flip to see [answer/question]

All Flashcards

What is the importance of protecting PII?

Protecting PII is crucial to prevent identity theft and other harms.

Why is it important to think before you post online?

Information online can be used in unintended ways, and deletion is difficult.

What is the danger of clicking on links from untrusted sources?

It can lead to malware infections or phishing attacks.

Why use strong passwords?

Strong passwords prevent unauthorized access to accounts.

How does MFA enhance security?

MFA adds extra layers of security, making it harder for unauthorized access.

What is the purpose of encryption?

Encryption prevents unauthorized access to data.

How do digital certificates ensure trust?

Digital certificates verify website authenticity.

Why are regular software updates important?

Updates patch up errors and vulnerabilities.

Why are data backups important?

Data backups mitigate hardware failure or virus attacks.

Why is it important to stay informed about technology?

Technology is always evolving, so staying informed is crucial for safe computing.

How is data collection used to enhance user experience?

Social media connections, faster product searches.

How is data collection used to power personalized features?

TikTok's For You page.

How can a picture of your view reveal where you live?

Location data or recognizable landmarks in the picture.

How does MFA enhance the security of online banking?

Requires a password and a one-time code sent to your phone, making it harder for hackers to access your account.

How are digital certificates used in e-commerce?

Verify the authenticity of the online store, ensuring secure transactions.

What are the differences between a virus and a worm?

Virus: Attaches to files, needs activation. Worm: Operates independently.

What are the differences between symmetric and public key encryption?

Symmetric: One key for both. Public: Public key to encrypt, private to decrypt.

Compare Knowledge, Possession, and Inheritance verification methods.

Knowledge: Something you know. Possession: Something you have. Inheritance: Something you are.