1. What is “social engineering” in cybersecurity?
Answer: b) Manipulating people to gain unauthorized access Explanation: Social engineering involves tricking people into revealing information or access, bypassing security systems.
2. Why is it a good idea to check the permissions an app requests before installing it?
Answer: c) To avoid giving unnecessary access to sensitive data Explanation: Apps sometimes request permissions that aren’t needed for functionality, which could be used to collect or misuse data.
3. What is “clickjacking”?
Answer: b) A malicious technique where a user is tricked into clicking something different than expected Explanation: Clickjacking hides harmful links under legitimate buttons, leading users to take unintended actions.
4. Why should you avoid using public Wi-Fi for online shopping or banking?
Answer: b) Hackers can intercept your information on unsecured networks Explanation: Public Wi-Fi is vulnerable to cyberattacks; it’s best to wait until you’re on a secure network or use a VPN.
5. How often should you update your passwords for critical accounts like email or banking?
Answer: b) Regularly, at least every few months Explanation: Regular updates prevent potential unauthorized access and ensure your account stays secure.
6. Which of these email attachments should you avoid opening?
Answer: b) A file from an unknown sender with a suspicious subject line Explanation: Unsolicited or suspicious attachments often contain malware or phishing attempts.
7. How can you check if a message claiming to be from a trusted source is legitimate?
Answer: b) By carefully examining the sender’s email address and contacting the organization directly Explanation: Scammers often mimic trusted sources, so it’s best to verify messages by contacting the source directly.
8. What’s an effective way to protect your online accounts beyond a password?
Answer: a) Using multi-factor authentication (MFA) Explanation: MFA requires multiple verification steps, making it much harder for unauthorized users to access your accounts.
9. Why is it important to sign out of accounts on shared computers?
Answer: b) To protect your information from others using the device Explanation: Logging out prevents others from accessing your accounts and sensitive information on shared devices.
10. Why is it risky to reuse the same password across multiple accounts?
Answer: b) If one account is compromised, others are at risk Explanation: Reusing passwords makes it easier for attackers to gain access to multiple accounts if they crack one.