Phishing
Malware
Password Security
Safe Internet Browsing & Regular Updates
10

"If a ‘Nigerian prince’ asks for your bank details, should you… 

(a) Send your info (b) Ask him to be your pen pal, or (c) Delete the email?"

Delete the email

10

If you get a pop-up saying ‘Your computer is infected! Click here to fix it,’ what should you do?"

Ignore it or close the pop-up; it might be malware.

10

"True or False: Reusing the same password across multiple accounts is a safe practice."

False!

10

"What does it mean when a URL starts with ‘https’ instead of ‘http’?"

It indicates that the website is secure and uses encryption to protect data.

10

"What’s the first thing you should check in an email to spot phishing?"

The sender’s email address.

10

"What type of malware encrypts files and demands payment to unlock them?"

Ransomware

10

"What is a ‘password manager’?"

A tool that securely stores and generates complex passwords.

10

"Which of the following should you regularly update?" (a) Your password, (b) Your operating system

Both!

10

"If an email claims you’ve won a million dollars, but you didn’t even enter a contest, what’s probably happening?"

It’s likely a phishing scam.

10

"Name one way malware commonly spreads from computer to computer."

Through email attachments, infected USBs, or malicious downloads.


10

"What is the recommended minimum length for a strong password?"

At least 8 characters and above.

10

"What does a padlock icon in the address bar signify?"

It indicates that the website is using SSL encryption, meaning your connection is secure.

10

"Which of these would likely be found in a phishing email?

(a) Unusual email address, (b) Suspicious link, or (c) Poor grammar."

All of the above.

10

"True or False:

Malware can only affect computers, not smartphones."

False!

10

"What does 2FA stand for, and why is it important?"

Two-Factor Authentication, it adds an extra layer of security by requiring a second form of verification.

10

"Why is it important to regularly update your software and applications?"

To fix vulnerabilities, protect your device against potential attacks.

10

"Which malicious tactic is used by cybercriminals to deceive individuals or systems by pretending to be a trustworthy source"

Spoofing

10

"What’s ‘scareware’?"

Malware that tricks you into thinking your system is infected to make you buy fake antivirus software.

10

"If a friend asks you for your email password, should you 

(a) share it, (b) tell them to mind their business, or (c) change the subject?"

Tell them to mind their business!

10

True or False:

"Public Wi-Fi networks are always secure to use."

False

M
e
n
u