1. What can a VPN (Virtual Private Network) do for your online privacy?
Answer: b) Protect your IP address and encrypt your internet traffic Explanation: VPNs add a layer of privacy by encrypting your traffic and hiding your IP, making it harder to track your activities.
2. What’s a secure way to share sensitive files?
Answer: b) Through a secure file-sharing service with encryption Explanation: Using a secure, encrypted service helps protect sensitive files from unauthorized access.
3. What is the best way to respond to a friend who asks for money through social media messaging?
Answer: b) Call or message them outside the platform to verify Explanation: Verifying outside the platform ensures it’s really your friend asking and not an imposter.
4. What’s the safest way to handle an attachment from an unknown email sender?
Answer: c) Scan it with antivirus software before opening Explanation: Scanning attachments first helps identify and avoid malware that could harm your device or steal data.
5. Why should you avoid posting real-time travel details on social media?
Answer: b) It informs potential intruders that your home is empty Explanation: Sharing travel plans in real-time increases security risks, as it reveals when your home might be vacant.
6. Why is it risky to download software from unofficial websites?
Answer: b) You might receive malware with the software Explanation: Unofficial sites often host modified or malicious versions of software that can compromise security.
7. How can you check if a message claiming to be from a trusted source is legitimate?
Answer: b) By carefully examining the sender’s email address and contacting the organization directly Explanation: Scammers often mimic trusted sources, so it’s best to verify messages by contacting the source directly.
8. When setting a password for a new online account, which of the following would make it strongest?
Answer: b) A random string of letters, numbers, and symbols Explanation: Randomized passwords are harder to guess, especially if they include uppercase letters, numbers, and symbols.
9. What should you do if you receive a suspicious phone call asking for personal information?
Answer: b) Hang up and verify the caller’s identity through official channels Explanation: Verifying through official channels ensures you’re dealing with a legitimate entity.
10. Which of these files should you avoid downloading?
Answer: b) Files from unknown senders or websites Explanation: Files from unknown sources may contain malware or viruses. Only download files from trusted sources.