Amina Allison
1. What does a “strong” password policy recommend?
Answer: b) Use complex, unique passwords for each account Explanation: Strong, unique passwords improve security and prevent attackers from accessing multiple accounts.
2. What does “data encryption” do?
Answer: a) Converts data into a format only readable with a decryption key Explanation: Encryption secures information, making it inaccessible without the correct decryption key.
3. Which of these is the safest way to log into multiple accounts without remembering dozens of passwords?
Answer: a) Use a password manager Explanation: Password managers securely store and organize complex passwords, making them accessible without sacrificing security.
4. You receive an email from your bank saying your account is locked, asking you to click a link to reset it. What’s the best first step?
Answer: b) Call your bank using the official number to confirm the email’s authenticity Explanation: Always verify unexpected emails by contacting your bank directly using official contact information. Phishing scams often disguise themselves as trustworthy institutions.
5. What’s a secure way to dispose of an old device?
Answer: b) Perform a factory reset and, if possible, use a data-wiping tool Explanation: A factory reset combined with a data-wiping tool ensures that sensitive information cannot be recovered.
6. How can you tell if an email link might be a phishing attempt?
Answer: a) The link is unusually long or uses a URL shortener Explanation: Phishing links are often disguised using URL shorteners or random characters. Hovering over the link can reveal its true destination.
7. What should you do if a website asks for your personal data but has no privacy policy?
Answer: b) Avoid entering any personal information Explanation: A privacy policy outlines how a site uses your data; without it, there’s no guarantee of responsible data handling.
8. What’s the purpose of a CAPTCHA on websites?
Answer: b) To prevent automated bots from spamming or misusing the site Explanation: CAPTCHAs are used to verify human users and prevent bots from performing malicious activities.
9. What is a “digital footprint”?
Answer: a) The trail of data you leave online Explanation: A digital footprint is the collection of data you leave behind while using the internet, which can impact privacy.
10. What should you do if you get an email claiming you’ve won a prize but don’t remember entering a contest?
Answer: b) Delete the email, as it’s likely a scam Explanation: Unsolicited prize emails are usually scams designed to collect personal information or infect devices with malware.