GENERAL CYBERSECURITY
PHISHING
AI AND DEEPFAKES
PASSWORDS
PHYSICAL SECURITY
200

Which of these is an example of antivirus software?
A. Windows Defender
B. Google Chrome
C. Adobe Reader
D. Zoom

A. Windows Defender

200

Which message is most likely a phishing attempt?
A. “Your account is locked! Click here to fix it.”
B. “Happy birthday!”
C. “Meeting at 3 PM”
D. “Lunch menu attached”

A. “Your account is locked! Click here to fix it.”

200

What is a deepfake?
A. A fake image or video made with AI
B. A strong password
C. A type of firewall
D. A secure website

A. A fake image or video made with AI

200

What should you never do with your password?
A. Share it
B. Change it
C. Remember it
D. Use special characters

A. Share it

200

Which is an example of physical security?
A. Door lock
B. VPN
C. Firewall
D. Antivirus

A. Door lock

400

What does a firewall do?
A. Blocks unauthorized access
B. Speeds up your internet
C. Stores passwords
D. Creates backups

A. Blocks unauthorized access

400

What should you do if you suspect a phishing email?
A. Report it
B. Reply to confirm
C. Click the link
D. Forward to friends

A. Report it

400

Why are deepfakes dangerous?
A. They can spread false information
B. They speed up computers
C. They block ads
D. They encrypt files

A. They can spread false information

400

What is a password manager?
A. A tool that stores passwords securely
B. A type of antivirus
C. A browser extension for ads
D. A Wi-Fi booster

A. A tool that stores passwords securely

400

What is tailgating?
A. Following someone into a secure area
B. Looking over someone’s shoulder
C. Throwing away documents
D. Sharing passwords

A. Following someone into a secure area

600

What is the main purpose of encryption?
A. To keep data private
B. To delete old files
C. To make files smaller
D. To block ads

A. To keep data private

600

You receive an email from your bank asking you to urgently verify your account due to suspicious activity. The email includes your full name and partial account number. What is the most likely phishing indicator in this scenario?

Answer Choices:
A. The presence of your name and account number
B. The urgency and request to click a link
C. The professional tone of the email
D. The bank’s logo in the email

B. The urgency and request to click a link

600

What is voice cloning?

a. Recording a podcast


b. Encrypting audio

c. Blocking spam calls

d. AI copying someone’s voice

d. AI copying someone’s voice

600

What is two-factor authentication?
A. Password plus another verification
B. Two passwords
C. Two devices
D. Two browsers

A. Password plus another verification

600

What should you do with sensitive papers?
A. Shred them
B. Leave them on your desk
C. Email them to yourself
D. Put them in the trash

A. Shred them

800

What does “patching” mean in cybersecurity?
A. Fixing security holes in software
B. Adding new hardware
C. Changing your password
D. Installing a VPN

A. Fixing security holes in software

800

An employee receives an email from their "CEO" asking for gift cards to be purchased and sent immediately. The email is well-written but comes from a Gmail address. What type of phishing attack is this?

Answer Choices:
A. Spear phishing
B. Clone phishing
C. Whaling
D. Vishing

C. Whaling

800


Which technology is often used to make deepfakes?
A. GANs
B. VPNs
C. DNS
D. API

A. GANs

800

What is a brute-force attack?
A Forcing the crack a database
B. Guessing every details of the code
C. Guessing every password
D. Blocking websites

C. Guessing every password

800

What is dumpster diving?
A. Searching trash for sensitive info
B. Encrypting files
C. Blocking spam
D. Using strong passwords

A. Searching trash for sensitive info