What does the “S” in HTTPS stand for?
A. Secure
B. Simple
C. Server
D. Software
A. Secure
What is phishing?
A. Tricking people into giving personal info
B. Blocking spam emails
C. Encrypting messages
D. Speeding up downloads
A. Tricking people into giving personal info
What does AI stand for?
A. Artificial Intelligence
B. Automated Internet
C. Advanced Interface
D. Active Integration
A. Artificial Intelligence
Which password is strongest?
A. P@ssw0rd!2025
B. 123456
C. password
D. qwerty
A. P@ssw0rd!2025
What should you do before leaving your desk?
A. Lock your computer
B. Leave it on
C. Share your password
D. Turn off Wi-Fi
A. Lock your computer
Which of these is an example of antivirus software?
A. Windows Defender
B. Google Chrome
C. Adobe Reader
D. Zoom
A. Windows Defender
Which message is most likely a phishing attempt?
A. “Your account is locked! Click here to fix it.”
B. “Happy birthday!”
C. “Meeting at 3 PM”
D. “Lunch menu attached”
A. “Your account is locked! Click here to fix it.”
What is a deepfake?
A. A fake image or video made with AI
B. A strong password
C. A type of firewall
D. A secure website
A. A fake image or video made with AI
What should you never do with your password?
A. Share it
B. Change it
C. Remember it
D. Use special characters
A. Share it
Which is an example of physical security?
A. Door lock
B. VPN
C. Firewall
D. Antivirus
A. Door lock
What does a firewall do?
A. Blocks unauthorized access
B. Speeds up your internet
C. Stores passwords
D. Creates backups
A. Blocks unauthorized access
What should you do if you suspect a phishing email?
A. Report it
B. Reply to confirm
C. Click the link
D. Forward to friends
A. Report it
Why are deepfakes dangerous?
A. They can spread false information
B. They speed up computers
C. They block ads
D. They encrypt files
A. They can spread false information
What is a password manager?
A. A tool that stores passwords securely
B. A type of antivirus
C. A browser extension for ads
D. A Wi-Fi booster
A. A tool that stores passwords securely
What is tailgating?
A. Following someone into a secure area
B. Looking over someone’s shoulder
C. Throwing away documents
D. Sharing passwords
A. Following someone into a secure area
What is the main purpose of encryption?
A. To keep data private
B. To delete old files
C. To make files smaller
D. To block ads
A. To keep data private
What does smishing use?
A. Text messages
B. Phone calls
C. Emails
D. Social media
A. Text messages
Which technology is often used to make deepfakes?
A. GANs
B. VPNs
C. DNS
D. API
A. GANs
What is two-factor authentication?
A. Password plus another verification
B. Two passwords
C. Two devices
D. Two browsers
A. Password plus another verification
What should you do with sensitive papers?
A. Shred them
B. Leave them on your desk
C. Email them to yourself
D. Put them in the trash
A. Shred them
What does “patching” mean in cybersecurity?
A. Fixing security holes in software
B. Adding new hardware
C. Changing your password
D. Installing a VPN
A. Fixing security holes in software
What is spear phishing?
A. A targeted phishing attack
B. A random spam email
C. A fake website
D. A virus
A. A targeted phishing attack
What is voice cloning?
A. AI copying someone’s voice
B. Recording a podcast
C. Encrypting audio
D. Blocking spam calls
A. AI copying someone’s voice
What is a brute-force attack?
A. Guessing every possible password
B. Sending phishing emails
C. Encrypting files
D. Blocking websites
A. Guessing every possible password
What is dumpster diving?
A. Searching trash for sensitive info
B. Encrypting files
C. Blocking spam
D. Using strong passwords
A. Searching trash for sensitive info