Week 2: The Most Resourceful Generation Step 1 of 8 12% Your smartphone goes missing, and you realize it was not protected with a password. What is the cyber security risk associated? No one will find it. Sensitive data may be exposed. It will automatically delete all data. It will run out of battery. You are about to install a new app and notice it asks for extensive permissions that seem unrelated to its function. What does this indicate? The app may be legitimate and safe. The app is likely outdated. The app could be collecting unnecessary data. The app will enhance your device's performance. You receive a notification that someone has accessed your account from an unfamiliar device. What should you be concerned about? A potential account takeover. A normal login attempt. A system update. A software glitch. You receive a suspicious text message asking for confidential information. What is this type of attack known as? Smishing. Whaling. Clone Phishing. Vishing. If you receive an email that seems too personal and asks for confidential information, what should you suspect? A legitimate request. A marketing email. A system update notification. A spear phishing attempt. You are creating a new password for a social media account, what should you do? Create a simple password that contains your name. Use the same password as another one of your online accounts. Create a unique and strong password for that account with MFA enabled. Write your password down and keep it near your computer. Why is it important to keep your software updated? It makes your device look nicer. Old software can have security flaws that make your device vulnerable. Updates take too long and are not necessary. It helps save battery life on your device. Which of the following would make the strongest password? A simple word that is easy to remember. A random combination of letters, numbers, and special characters. Your name followed by your birthday. A common phrase. CommentsThis field is for validation purposes and should be left unchanged.