Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
NUMBERS, FACTS AND TRENDS SHAPING YOUR WORLD ABOUT FOLLOW MY ACCOUNT DONATE
Internet & Technology
MENU RESEARCH AREAS ARCH
ee elow how our reult compare with the 1,055 randoml ampled adult that took part in our national urve and
review how ou reponded to each quetion. For more finding from the urve, read "What the Pulic Know Aout
Cerecurit." (http://www.pewinternet.org/2017/03/22/what-the-pulic-know-aout-cerecurit/)
You scored better than 91% of the public, below 4% of the public
and the same as 5%.
16% 16%
15%
12%
11%
<7% 7% 7%
5%
3%
1%
0 1 2 3 4 5 6 7 8 9 10
T O TA L N U M B E R O F Q U E S T I O N S A N S W E R E D C O R R E C T LY
These percentages only reflect the 1,055 adults who took part in the national survey; online quiz results are not included in the sample.
http://www.pewinternet.org/quiz/cybersecurity-knowledge/ 1/4
2/23/2018 Cybersecurity Knowledge Quiz | Pew Research Center
% of adult anwering Read More
...
What doe the “http://” at the
eginning of a URL denote, a ncrpting information entered into a
oppoed to "http://" (without the weite make it far more difficult for anone
Correctl: 75%
“”)? other than the uer and weite owner to
Incorrectl: 8%
read the information. A of Feruar 2017,
Not ure: 17%
You correctl anwered That around half of all internet traffic i now
information entered into the site encrpted.
is encrypted
Which of the following i an Phihing attack attempt to get a uer to
example of a “phihing” attack? Correctl: 73% click on a maliciou link or file
Incorrectl: 7% imperonating a truted ource the uer i
You correctl anwered All of the Not ure: 20% familiar with. All three of the choice lited
above are example of a phihing attack.
A rootkit i a tpe of maliciou oftware
A group of computer that i
deigned to gain unauthorized acce to a
networked together and ued Correctl: 54%
computer tem. DDo tand for
hacker to teal information i Incorrectl:
Ditriuted Denial of ervice, it i an attack
called a … 21%
where large amount of requet are ent to
Not ure: 24%
a we erver in order to overwhelm the
You correctl anwered Botnet
erver and hut it down.
ome weite and online ervice
ue a ecurit proce called two- Thi i the onl example of two-tep
tep authentication. Which of the authentication lited – true two-tep
following image i an example of authentication require the uer to enter a
two-tep authentication? Correctl: 51% one-time code each time the log in to their
Incorrectl: account, in addition to their regular
You correctl anwered 22% uername and paword. While the other
1 Not ure: 26% anwer ma require uer to perform two
eparate operation to gain acce to a ite,
the are not example of two-tep
authentication.
Thi paword contain the aic element
of a trong paword recommended
expert. It contain a comination of letter,
Which of the following four numer and mol; it include oth upper
Correctl: 48%
paword i the mot ecure? and lower cae letter; and it doe not
Incorrectl: 9%
contain an word from the dictionar. For
Not ure: 43%
You correctl anwered WTh!5Z more information on creating trong
paword, ee:
http://www.wired.com/2016/05/paword-
tip-expert/
http://www.pewinternet.org/quiz/cybersecurity-knowledge/ 2/4
2/23/2018 Cybersecurity Knowledge Quiz | Pew Research Center
% of adult anwering Read More
...
Criminal acce omeone’
computer and encrpt the uer’
peronal file and data. The uer i
Correctl: 39%
unale to acce thi data unle Driving i hort for for “war driving,” which i
Incorrectl:
the pa the criminal to decrpt the a technique where hacker drive around an
12%
file. Thi practice i called … area looking for inecure Wi-Fi network.
Not ure: 49%
You anwered Not sure
The correct anwer i Ranomware
“Private rowing” i a feature in
man internet rower that let
uer acce we page without
an information (like rowing Private rowing prevent a uer’ internet
Correctl: 33%
hitor) eing tored the rower. rower from toring certain kind of file on
Incorrectl:
Can internet ervice provider ee hi or her device. However, internet ervice
12%
the online activitie of their provider can till ee all of the detail of the
Not ure: 54%
ucrier when thoe ucrier uer' we traffic.
are uing private rowing?
You correctl anwered Yes
Turning off the GP function of our
Correctl: 10%
martphone prevent an tracking In addition to GP, martphone can alo e
Incorrectl:
of our phone’ location. tracked uing the cellphone tower or Wi-Fi
71%
network that the phone i connected to.
Not ure: 18%
You correctl anwered False
If a pulic Wi-Fi network (uch a in
an airport or café) require a
ven if a pulic Wi-Fi network require a
paword to acce, i it generall
paword, other uer can potentiall view
afe to ue that network for Correctl: 16%
the enitive information a uer end
enitive activitie uch a online Incorrectl:
acro that Wi-Fi network. For more
anking? 10%
information ee:
Not ure: 73%
http://fieldguide.gizmodo.com/how-to-ta-
You anwered Not sure
afe-on-pulic-wifi-1779464400
The correct anwer i No, it i not
afe
What kind of cerecurit rik can
A Virtual Private Network (VPN) allow uer
e minimized uing a Virtual Correctl: 13%
to create an encrpted connection etween
Private Network (VPN)? Incorrectl:
their device and the internet, making it
16%
much harder for anone other than the uer
You correctl anwered Use of Not ure: 70%
to ee their activit.
insecure Wi-Fi networks
HAR Y O U R COR
TWEET SHARE
For more research and analysis, follow Pew Research Center
on twitter, facebook, or sign up for our weekly newsletter:
http://www.pewinternet.org/quiz/cybersecurity-knowledge/ 3/4
2/23/2018 Cybersecurity Knowledge Quiz | Pew Research Center
Follow
Like
Sign Up
Latest Internet and Technology Research
Public Comments to the Federal Communications Commission About Net Neutrality Contain Many Inaccuracies
and Duplicates
E M B ED </> © P E W RESEAR C H C E N T E R
http://www.pewinternet.org/quiz/cybersecurity-knowledge/ 4/4