1. How often should you change your Wi-Fi password?
Answer: b) When you suspect unauthorized access or after sharing it with others Explanation: Changing Wi-Fi passwords limits unauthorized access and keeps your network secure.
2. You receive a pop-up saying your computer is infected and you need to download software immediately. What should you do?
Answer: b) Close the pop-up and run your own trusted antivirus program Explanation: Pop-ups like this are often scams. Running your own antivirus ensures any threats are handled safely.
3. Why is it a good idea to check the permissions an app requests before installing it?
Answer: c) To avoid giving unnecessary access to sensitive data Explanation: Apps sometimes request permissions that aren’t needed for functionality, which could be used to collect or misuse data.
4. What should you do if your social media account is hacked?
Answer: b) Change your password and check for unauthorized access Explanation: Resetting passwords and monitoring access are essential steps to secure a hacked account and prevent further misuse.
5. Which of these files should you avoid downloading?
Answer: b) Files from unknown senders or websites Explanation: Files from unknown sources may contain malware or viruses. Only download files from trusted sources.
6. What should you do if your device prompts you to install an unexpected update?
Answer: b) Verify the update’s authenticity first Explanation: Ensuring updates are legitimate prevents malicious software from being installed on your device.
7. What’s the safest way to handle an attachment from an unknown email sender?
Answer: c) Scan it with antivirus software before opening Explanation: Scanning attachments first helps identify and avoid malware that could harm your device or steal data.
8. What’s the purpose of a firewall?
Answer: b) To filter incoming and outgoing network traffic for potential threats Explanation: Firewalls protect systems by blocking potentially malicious traffic, helping to secure your network.
9. What is “pharming”?
Answer: b) Redirecting users from a legitimate website to a fake one Explanation: Pharming redirects users to malicious sites to steal personal information.
10. What is a “zero-day” vulnerability?
Answer: b) A security flaw that attackers exploit before the developer has a patch Explanation: Zero-day vulnerabilities are dangerous because they’re exploited before they can be patched.