What does the “S” in HTTPS stand for?
A. Secure
B. Simple
C. Server
D. Software
A. Secure
What is phishing?
A. Tricking people into giving personal info
B. Blocking spam emails
C. Encrypting messages
D. Speeding up downloads
A. Tricking people into giving personal info
What does AI stand for?
A. Artificial Intelligence
B. Automated Internet
C. Advanced Interface
D. Active Integration
A. Artificial Intelligence
Which password is strongest?
A. P@ssw0rd!2025
B. 123456
C. password
D. qwerty
A. P@ssw0rd!2025
What should you do before leaving your desk?
A. Lock your computer
B. Leave it on
C. Share your password
D. Turn off Wi-Fi
A. Lock your computer
Which of these is an example of antivirus software?
A. Windows Defender
B. Google Chrome
C. Adobe Reader
D. Zoom
A. Windows Defender
Which message is most likely a phishing attempt?
A. “Your account is locked! Click here to fix it.”
B. “Happy birthday!”
C. “Meeting at 3 PM”
D. “Lunch menu attached”
A. “Your account is locked! Click here to fix it.”
What is a deepfake?
A. A fake image or video made with AI
B. A strong password
C. A type of firewall
D. A secure website
A. A fake image or video made with AI
What should you never do with your password?
A. Share it
B. Change it
C. Remember it
D. Use special characters
A. Share it
Which is an example of physical security?
A. Door lock
B. VPN
C. Firewall
D. Antivirus
A. Door lock
What does a firewall do?
A. Blocks unauthorized access
B. Speeds up your internet
C. Stores passwords
D. Creates backups
A. Blocks unauthorized access
What should you do if you suspect a phishing email?
A. Report it
B. Reply to confirm
C. Click the link
D. Forward to friends
A. Report it
Why are deepfakes dangerous?
A. They can spread false information
B. They speed up computers
C. They block ads
D. They encrypt files
A. They can spread false information
What is a password manager?
A. A tool that stores passwords securely
B. A type of antivirus
C. A browser extension for ads
D. A Wi-Fi booster
A. A tool that stores passwords securely
What is tailgating?
A. Following someone into a secure area
B. Looking over someone’s shoulder
C. Throwing away documents
D. Sharing passwords
A. Following someone into a secure area
What is the main purpose of encryption?
A. To keep data private
B. To delete old files
C. To make files smaller
D. To block ads
A. To keep data private
You receive an email from your bank asking you to urgently verify your account due to suspicious activity. The email includes your full name and partial account number. What is the most likely phishing indicator in this scenario?
Answer Choices:
A. The presence of your name and account number
B. The urgency and request to click a link
C. The professional tone of the email
D. The bank’s logo in the email
B. The urgency and request to click a link
What is voice cloning?
a. Recording a podcast
b. Encrypting audio
c. Blocking spam calls
d. AI copying someone’s voice
d. AI copying someone’s voice
What is two-factor authentication?
A. Password plus another verification
B. Two passwords
C. Two devices
D. Two browsers
A. Password plus another verification
What should you do with sensitive papers?
A. Shred them
B. Leave them on your desk
C. Email them to yourself
D. Put them in the trash
A. Shred them
What does “patching” mean in cybersecurity?
A. Fixing security holes
B. Adding new hardware
C. Changing your password
D. Installing a VPN
A. Fixing security holes
An employee receives an email from their "CEO" asking for gift cards to be purchased and sent immediately. The email is well-written but comes from a Gmail address. What type of phishing attack is this?
Answer Choices:
A. Spear phishing
B. Clone phishing
C. Whaling
D. Vishing
C. Whaling
Which technology is often used to make deepfakes?
A. GANs
B. VPNs
C. DNS
D. API
A. GANs
What is a brute-force attack?
A Forcing the crack a database
B. Guessing every details of the code
C. Guessing every password
D. Blocking websites
C. Guessing every password
What is dumpster diving?
A. Searching trash for sensitive info
B. Encrypting files
C. Blocking spam
D. Using strong passwords
A. Searching trash for sensitive info