Password and Authentication
Phishing & Social Engineering
Malware & Threats
Secure Online Practices
Data Protection & Response
100

What is the primary purpose of a password?

A. To impress others 

B. To secure your accounts 

C. To share with friends 

D. To personalize your device

B. To secure your accounts

100

What does "phishing" refer to in cybersecurity?


A. Catching fish 

B. Hacking mobile phones 

C. Fraudulent attempts to steal personal information

D. Sending spam emails

C. Fraudulent attempts to steal personal information

100

What is malware?


A. A software used to protect your computer 

B. A harmful program that can damage your system or steal information 

C. A type of firewall 

D. A tool for software updates

B. A harmful program that can damage your system or steal information

100

What should you regularly do to your banking app to enhance security?


A. Delete it 

B. Never update it 

C. Update it to the latest version 

D. Share it with others

C. Update it to the latest version

100

What is identity theft?


A. When someone steals your email 

B. When your bank changes your PIN

C. When you lose your ID card 

D. When someone fraudulently uses your personal information  

D. When someone fraudulently uses your personal information

200
​​​Which is the safest practice when creating a password for online banking?​​​


A. Using your birthdate 

B. Using a combination of letters, numbers, and symbols

C. Using your name 

D. Reusing the same password

B. Using a combination of letters, numbers, and symbols

200

Which of the following is a sign of a phishing email?


A. Unexpected attachment or link

B. Personalized greeting 

C. Correct logo 

D. A way to access two accounts at once  

A. Unexpected attachment or link

200

What is the role of antivirus software?


A. To detect and remove malware 

B. Installing antivirus software 

C. Leaving it unlocked 

D. Sharing your login details

A. To detect and remove malware

200

What does "HTTPS" in a web address indicate?


A. The site is fast 

B. The site is secure for transactions 

C. The site has viruses 

D. The site is hosted in the cloud

B. The site is secure for transactions

200

Which of the following can help protect against identity theft? 


A. Sharing your passwords with family 

B. Monitoring your bank accounts regularly for suspicious activity

C. Using your birthday as your password 

D. Posting your full name and birthdate online

B. Monitoring your bank accounts regularly for suspicious activity

300

Which of the following is a strong password? 


A. 123456  

B. password 

C. B@nkS@fe2024

D. qwerty

C. B@nkS@fe2024

300

What should you do if you receive an email asking for your banking details?


A. Respond quickly 

B. Call the sender 

C. Ignore it 

D. Report it to your bank and delete the email

D. Report it to your bank and delete the email

300

Why should you never click on a suspicious link in an email?


A. It may take you to a slow website 

B. It could infect your computer with malware  

C. Using your name 

D. Reusing the same password

B. It could infect your computer with malware

300

Which is the safest way to access your bank account online?


A. Through a public computer 

B. Using your mobile data on a personal device 

C. Using any shared Wi-Fi 

D. Using a friend's phone

B. Using your mobile data on a personal device 



300

What is a method of coding data so only authorized users can read it? 


A. A technique to slow down hackers 

B. Encryption

C. A software used to boost Wi-Fi 

D. A virus that damages files

B. Encryption

400

Why should you avoid using the same password for multiple accounts? 


A. It’s difficult to remember 

B. It increases the risk of all accounts being hacked if one is compromised

C. It makes online banking easier 

D. Banks don’t allow it

B. It increases the risk of all accounts being hacked if one is compromised

400

What is social engineering in cybersecurity?


A. The process of manipulating people to give up confidential information 

B. A type of antivirus software 

C. Training employees for cybersecurity 

D. Upgrading a computer's hardware

A. The process of manipulating people to give up confidential information 

400

What is a malicious software encrypting files or computer systems and requesting a ransom for their decryption?


A. Encryption 

B. Ransomware

C. Malware 

D. Decryption

B. Ransomware

400

Why should you avoid using public Wi-Fi for banking transactions?


A. It’s too slow 

B. It may expose your data to hackers 

C. It’s expensive 

D. It blocks bank websites

B. It may expose your data to hackers

400

What is it when a company's sensitive data is accessed without authorization? 


A. A free Wi-Fi connection 

B. A data breach 

C. A type of firewall 

D. When your computer crashes


B. A data breach 

500

Which of the following is a form of multi-factor authentication? 


A. Using only your password 

B. Password and fingerprint scan

C. Password and username 

D. Only PIN code

B. Password and fingerprint scan

500

What is spear-phishing?


A. A type of phishing targeted at specific individuals or organizations 

B. Logging out immediately after finishing your session 

C. A method to hack computers 

D. A type of email marketing

A. A type of phishing targeted at specific individuals or organizations 

500

What is a form of malware that monitors user activities and reports them to an external third party? 


A. Malware 

B. Spyware 

C. Ransomware 

D. Ware

B. Spyware

500

Why should you log out of your online banking account after using it? 


A. To avoid someone else accessing your account 

B. To save data 

C. To refresh the website 

D. To prevent ads from showing

A. To avoid someone else accessing your account

500

What should you do if you think your bank account has been compromised? 


A. Change your password immediately and contact your bank 

B. Wait for the bank to notify you 

C. Ignore it 

D. Withdraw all your money

A. Change your password immediately and contact your bank

M
e
n
u