True or False
Fill in the blank
What is it?
Multiple Choices
100

 Enabling two-factor authentication (2FA) significantly improves the security of online accounts.

True

100

 A __________ is a type of malicious software designed to block access to a computer system until a sum of money is paid.

ransomware

100

Sarah received an email from her bank asking her to update her account information by clicking a link, but the email was actually from a cybercriminal.

Sarah is a victim of a phishing attack.

100

Which of the following is a common method used to protect against phishing attacks?

  • A) Ignoring all emails
  • B) Using strong passwords
  • C) Regularly updating software
  • D) Verifying the sender’s email address and not clicking on suspicious links

 

 D) Verifying the sender’s email address and not clicking on suspicious links

200

Antivirus software alone can protect you from all types of cyber threats.

False. While antivirus software is an important layer of defense, it is not foolproof and should be used in conjunction with other security measures like firewalls, regular software updates, and safe browsing practices.

200

 The process of scrambling data to prevent unauthorized access is called __________.

encryption

200

Tom noticed that his online banking account showed transactions he did not make after he connected to a public Wi-Fi at a coffee shop.

Tom has experienced a man-in-the-middle attack.

200

What is the primary purpose of a firewall?

  • A) To speed up internet connection
  • B) To monitor and control incoming and outgoing network traffic
  • C) To backup data
  • D) To manage software updates

B) To monitor and control incoming and outgoing network traffic


300

Phishing is a technique used by cybercriminals to trick individuals into revealing personal information through deceptive emails or websites.

True. Phishing involves fraudulent attempts, typically via email, to steal personal information by pretending to be a trustworthy entity.

300

 __________ is a practice where a user is required to present two different types of evidence to verify their identity

 Two-factor authentication (2FA)

300

Lisa downloaded a free software program, and now her files are encrypted and she is being asked to pay money to get them back.

Lisa's computer is infected with ransomware.

300

Which type of malware is designed to replicate itself and spread to other computers?

  • A) Spyware
  • B) Ransomware
  • C) Worm
  • D) Adware

C) Worm

400

Keeping your software and operating system up to date can help protect your computer from security vulnerabilities.

True. Regular updates and patches address known vulnerabilities and help protect your system from being exploited by cybercriminals.

400

A __________ is a software application or hardware device that records every keystroke made by a user, typically without their knowledge.

keylogger

400

After clicking on an advertisement, Mike's browser started redirecting him to unwanted websites and displaying pop-up ads.

Mike's computer is infected with adware. 

400

What does the term "malware" refer to? A. 

A hardware component
B. Malicious software
C. An email scam
D. A type of web browser

 B. Malicious software

500

Public Wi-Fi networks are safe to use for online banking and shopping as long as they are password-protected.

False. Public Wi-Fi networks, even if password-protected, can be risky as they are often less secure and more susceptible to attacks like man-in-the-middle attacks. It's safer to use a secure, private network or a VPN for sensitive transactions.

500

 __________ is the unauthorized copying, transfer, or retrieval of data from a system or network.

Data exfiltration

500

Emma found out that someone has been using her personal information to open credit card accounts in her name without her knowledge.

Emma is a victim of identity theft.

500

Which of the following is the best practice for creating a strong password?

  • A) Using your name or birthdate
  • B) Using a single word found in the dictionary
  • C) Combining uppercase letters, lowercase letters, numbers, and special characters
  • D) Using the same password for all accounts

C) Combining uppercase letters, lowercase letters, numbers, and special characters

M
e
n
u