1. What should you be cautious about when using social media “quizzes” that ask for personal details?
Answer: b) They may collect data to guess security answers Explanation: Quizzes can collect information that could help attackers guess your password or security answers.
2. What should you check before downloading an app from an app store?
Answer: a) The app’s permissions and reviews Explanation: Checking permissions and reviews helps ensure the app is legitimate and doesn’t request unnecessary access.
3. What should you do before clicking on a shortened URL link?
Answer: b) Hover over it or use a URL checker Explanation: Hovering over shortened links or using a URL checker reveals the destination, helping you avoid malicious sites.
4. What’s a primary benefit of using end-to-end encrypted messaging apps?
Answer: b) Ensures that only the sender and recipient can read the messages Explanation: End-to-end encryption prevents anyone but the intended recipient from accessing the content.
5. Which social media setting helps protect your privacy?
Answer: c) Limiting profile visibility to friends only Explanation: Restricting profile visibility ensures only trusted individuals can see your information, reducing privacy risks.
6. How often should you update your passwords for critical accounts like email or banking?
Answer: b) Regularly, at least every few months Explanation: Regular updates prevent potential unauthorized access and ensure your account stays secure.
7. What is “social engineering” in cybersecurity?
Answer: b) Manipulating people to gain unauthorized access Explanation: Social engineering involves tricking people into revealing information or access, bypassing security systems.
8. Which of these is a telltale sign of a potentially malicious website?
Answer: b) It has numerous pop-up ads Explanation: Malicious sites often flood visitors with pop-ups to trigger downloads or redirect users to unsafe content.
9. You’re creating a social media profile. Which of the following personal details should you avoid posting publicly?
Answer: b) Your birthdate Explanation: Details like birthdate can be used for identity theft or security questions, so avoid sharing sensitive information publicly.
10. What is “pharming” in the context of cybersecurity?
Answer: b) Redirecting users to fake websites without their knowledge Explanation: Pharming involves redirecting users to fraudulent sites, often to steal credentials or personal information.