April Quiz Step 1 of 6 16% Which of the following is a recommended second factor for multi-factor authentication? An authenticator app Screen resolution Wi-Fi network name (SSID) Desktop wallpaper Which of the following may indicate suspicious account activity? Alerts about logins from devices you have never used Account recovery attempts you didn’t start Messages sent to your contacts without your involvement All of the above Why is it important to review the permissions that an app requests? To earn rewards points To guarantee the app will run without internet access To ensure the app does not access more personal data than necessary To make the app load faster Which of the following is an example of spear phishing? An email targeting a specific employee with personalized information A mass email advertising a free cruise A random pop-up claiming your device is infected A generic text message from an unknown number Which of the following payment methods generally provides the strongest buyer protection? A gift card A newly launched cryptocurrency A wire transfer A credit card What is the process of converting information so that only authorized parties can read it? Clicking Encrypting Pasting Scrolling EmailThis field is for validation purposes and should be left unchanged.