What is phishing?
Answer: 2. A method used to obtain sensitive information by disguising as a trustworthy entity.
What is the first step in developing a prevention and protection strategy?
a) Identify potential risks and threats
b) Implement security measures
c) Train employees on security protocols
d) Conduct a risk assessment
a) Identify potential risks and threats
What is the most common risk associated with sharing personal information online?
a) Getting free stuff
b) Making new friends
c) Identity theft
d) Finding job opportunities
Answer: c) Identity theft
When creating passwords, which of the following is the strongest option?
a)Your name
b)A single word
c)A phrase
d)A pattern
Answer: c) A phrase
Which of the following is NOT a red flag that an article may be fake news?
a) The article is published on a website with a strange or unfamiliar domain name.
b) The article uses sensational or exaggerated language to describe events.
c) The article cites multiple sources to back up its claims.
d) The article contains spelling and grammatical errors.
Answer: c) The article cites multiple sources to back up its claims. While it is generally a good sign when an article cites sources, it is possible for fake news to cite sources that are unreliable or nonexistent.
What is malware?
1. A type of software that is designed to harm or damage computer systems
2. A type of computer hardware that is prone to failure
3.A type of computer network that is vulnerable to attacks
Answer: 1. A type of software that is designed to harm or damage computer systems.
Which of the following is an example of a physical security measure?
a) Firewall
b) Encryption
c) CCTV cameras
d) Two-factor authentication
c) CCTV cameras
How can sharing personal information online lead to online reputation damage?
a) By making new friends online
b) By sharing information about your hobbies and interests
c) By posting inappropriate or controversial information that may be seen by potential employers, colleagues, or other important people in your life
d) By sharing positive and uplifting messages
Answer: c) By posting inappropriate or controversial information that may be seen by potential employers, colleagues, or other important people in your life
Which of the following is NOT a way to protect your personal information online?
a) Using two-factor authentication
b) Sharing your passwords with friends
c) Keeping your software up to date
d) Using a VPN
Answer: b) Sharing your passwords with friends
Which of the following is a reliable source of news? a) A personal blog written by an anonymous author. b) A news article published on a well-known and reputable news website.
c) A post on social media that has been shared thousands of times.
d) A video on YouTube created by a conspiracy theorist.
Answer: b) A news article published on a well-known and reputable news website. Personal blogs and videos created by conspiracy theorists are not necessarily reliable sources of information, and social media posts can be easily manipulated and shared without fact-checking.
What is a firewall?
1. A type of antivirus software
2. A program or hardware device that filters network traffic to prevent unauthorized access
3. A type of hacker tool used to gain access to computer systems
Answer: 2. A program or hardware device that filters network traffic to prevent unauthorized access.
What is the purpose of a business continuity plan?
a) To prevent security breaches
b) To recover from security breaches
c) To train employees on security protocols
d) To implement security measures
b) To recover from security breaches
What is the risk of cyberbullying?
a) You might become more popular online
b) You might receive more likes and followers
c) Cyberbullies can use personal information such as your email address, phone number, or location to harass or intimidate you online
d) You might make new friends online
Answer: c) Cyberbullies can use personal information such as your email address, phone number, or location to harass or intimidate you online
Which of the following is a red flag for an email or message that may be a phishing attempt?
a) The sender's email address is familiar
b) The message is urgent
c) The message asks for personal information d) The message contains correct grammar and spelling
Answer: c) The message asks for personal information
Which of the following is a reliable fact-checking website?
a) Snopes.com
b) Newsmax.com
d) Infowars.com
Answer: a) Snopes.com. Snopes.com is a well-known and reputable fact-checking website that has been in operation since 1995. Newsmax.com, Breitbart.com, and Infowars.com are all known for publishing politically biased content and are not considered reliable sources of information.
What is a brute-force attack?
1. A type of attack that involves guessing a password by trying every possible combination
2. A type of phishing attack that tricks users into revealing sensitive information
3. A type of malware that replicates itself and spreads to other systems
Answer: 1. A type of attack that involves guessing a password by trying every possible combination.
What is the best way to prevent social engineering attacks?
a) Implementing technical controls
b) Training employees on security awareness
c) Installing antivirus software
d) Conducting regular vulnerability scans
b) Training employees on security awareness
What is the risk of sharing personal information such as your location or routine online?
a) Winning a prize
b) Getting more likes and followers
c) Being stalked
d) Making new friends online
Answer: c) Being stalked
Which of the following is a way to prevent identity theft?
a) Using strong passwords
b) Shredding documents that contain personal information
c) Reviewing your credit report regularly
d) All of the above
Answer: d) All of the above
Which of the following is NOT a good way to fact-check a news article?
a) Checking other news websites to see if they are reporting the same information.
b) Looking for the author's credentials and background information.
c) Checking the article's publication date to make sure it is recent.
d) Assuming that the article must be true if it aligns with your political beliefs.
Answer: d) Assuming that the article must be true if it aligns with your political beliefs. Confirmation bias can lead people to accept information that reinforces their pre-existing beliefs, even if that information is not accurate.
What is social engineering?
1. A type of attack that uses social media to gain access to sensitive information
2. A type of attack that targets human behavior to trick people into revealing sensitive information
3. A type of attack that exploits vulnerabilities in computer software
Answer: 2. A type of attack that targets human behavior to trick people into revealing sensitive information.
What is the most effective way to secure sensitive data?
a) Encrypting the data
b) Backing up the data
c) Storing the data on a secure server
d) Deleting the data
a) Encrypting the data
If a lot of companies have your personal information what might happen?
a) You will get a lot of dms
b) You will get famous
c) You will get rich
d) You will get targeted by Advertisers
Answer: d) You will get targeted by Advertisers.
Which of the following is a way to protect your online privacy?
a) Using social media platforms without adjusting privacy settings
b) Sharing personal information with strangers online
c) Using a VPN
d) None of the above
Answer: c) Using a VPN
Which of the following is a red flag that a source of information may be unreliable?
a) The source has a clear bias or agenda.
b) The source has a long history of accurate reporting.
c) The source is widely respected and trusted by the general public.
d) The source has been recommended by a friend or family member.
Answer: a) The source has a clear bias or agenda. While some sources with a clear bias or agenda may still be reliable, it is important to be aware of potential biases when evaluating information. A long history of accurate reporting, wide public trust, and recommendations from friends or family members are not enough to guarantee the reliability of a source