Which item is listed as a vulnerability associated with social networking?

Prepare for the CAT Theory Grade 11 Test. Explore flashcards, quizzes, and curated questions designed to enhance understanding. Each question is accompanied by hints and detailed explanations to ensure readiness for your test.

Multiple Choice

Which item is listed as a vulnerability associated with social networking?

Explanation:
Sharing information on social networks opens doors for misuse of personal data. Identity theft and false identities are a vulnerability because someone can collect enough details from profiles to impersonate you, commit fraud, or trick others into revealing more information. This risk is specific to online social platforms, where people may not fully verify who they’re interacting with and where easy access to personal details can be exploited. The other scenarios describe potential positives or protections: more face-to-face meetings aren’t an online vulnerability, higher productivity is a benefit, and more secure data handling is a security improvement rather than a vulnerability.

Sharing information on social networks opens doors for misuse of personal data. Identity theft and false identities are a vulnerability because someone can collect enough details from profiles to impersonate you, commit fraud, or trick others into revealing more information. This risk is specific to online social platforms, where people may not fully verify who they’re interacting with and where easy access to personal details can be exploited.

The other scenarios describe potential positives or protections: more face-to-face meetings aren’t an online vulnerability, higher productivity is a benefit, and more secure data handling is a security improvement rather than a vulnerability.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy