GENERAL CYBERSECURITY
PHISHING
AI AND DEEPFAKES
PASSWORDS
PHYSICAL SECURITY
200

What does the “S” in HTTPS stand for?
A. Secure
B. Simple
C. Server
D. Software

A. Secure

200

What is phishing?
A. Tricking people into giving personal info
B. Blocking spam emails
C. Encrypting messages
D. Speeding up downloads

A. Tricking people into giving personal info

200

What does AI stand for?
A. Artificial Intelligence
B. Automated Internet
C. Advanced Interface
D. Active Integration

A. Artificial Intelligence

200

Which password is strongest?
A. P@ssw0rd!2025
B. 123456
C. password
D. qwerty

A. P@ssw0rd!2025

200

What should you do before leaving your desk?
A. Lock your computer
B. Leave it on
C. Share your password
D. Turn off Wi-Fi

A. Lock your computer

400

Which of these is an example of antivirus software?
A. Windows Defender
B. Google Chrome
C. Adobe Reader
D. Zoom

A. Windows Defender

400

Which message is most likely a phishing attempt?
A. “Your account is locked! Click here to fix it.”
B. “Happy birthday!”
C. “Meeting at 3 PM”
D. “Lunch menu attached”

A. “Your account is locked! Click here to fix it.”

400

What is a deepfake?
A. A fake image or video made with AI
B. A strong password
C. A type of firewall
D. A secure website

A. A fake image or video made with AI

400

What should you never do with your password?
A. Share it
B. Change it
C. Remember it
D. Use special characters

A. Share it

400

Which is an example of physical security?
A. Door lock
B. VPN
C. Firewall
D. Antivirus

A. Door lock

600

What does a firewall do?
A. Blocks unauthorized access
B. Speeds up your internet
C. Stores passwords
D. Creates backups

A. Blocks unauthorized access

600

What should you do if you suspect a phishing email?
A. Report it
B. Reply to confirm
C. Click the link
D. Forward to friends

A. Report it

600

Why are deepfakes dangerous?
A. They can spread false information
B. They speed up computers
C. They block ads
D. They encrypt files

A. They can spread false information

600

What is a password manager?
A. A tool that stores passwords securely
B. A type of antivirus
C. A browser extension for ads
D. A Wi-Fi booster

A. A tool that stores passwords securely

600

What is tailgating?
A. Following someone into a secure area
B. Looking over someone’s shoulder
C. Throwing away documents
D. Sharing passwords

A. Following someone into a secure area

800

What is the main purpose of encryption?
A. To keep data private
B. To delete old files
C. To make files smaller
D. To block ads

A. To keep data private

800

You receive an email from your bank asking you to urgently verify your account due to suspicious activity. The email includes your full name and partial account number. What is the most likely phishing indicator in this scenario?

Answer Choices:
A. The presence of your name and account number
B. The urgency and request to click a link
C. The professional tone of the email
D. The bank’s logo in the email

B. The urgency and request to click a link

800

What is voice cloning?

a. Recording a podcast


b. Encrypting audio

c. Blocking spam calls

d. AI copying someone’s voice

d. AI copying someone’s voice

800

What is two-factor authentication?
A. Password plus another verification
B. Two passwords
C. Two devices
D. Two browsers

A. Password plus another verification

800

What should you do with sensitive papers?
A. Shred them
B. Leave them on your desk
C. Email them to yourself
D. Put them in the trash

A. Shred them

1000

What does “patching” mean in cybersecurity?
A. Fixing security holes
B. Adding new hardware
C. Changing your password
D. Installing a VPN

A. Fixing security holes

1000

An employee receives an email from their "CEO" asking for gift cards to be purchased and sent immediately. The email is well-written but comes from a Gmail address. What type of phishing attack is this?

Answer Choices:
A. Spear phishing
B. Clone phishing
C. Whaling
D. Vishing

C. Whaling

1000


Which technology is often used to make deepfakes?
A. GANs
B. VPNs
C. DNS
D. API

A. GANs

1000

What is a brute-force attack?
A Forcing the crack a database
B. Guessing every details of the code
C. Guessing every password
D. Blocking websites

C. Guessing every password

1000

What is dumpster diving?
A. Searching trash for sensitive info
B. Encrypting files
C. Blocking spam
D. Using strong passwords

A. Searching trash for sensitive info