Amina Allison
1. What should you do if you realize you accidentally gave your password to a phishing website?
Answer: a) Change your password immediately Explanation: Changing your password helps secure your account and prevent unauthorized access.
2. What does “data encryption” do?
Answer: a) Converts data into a format only readable with a decryption key Explanation: Encryption secures information, making it inaccessible without the correct decryption key.
3. What should you do if an app asks for excessive permissions, like access to your contacts and location?
Answer: c) Decline and uninstall if permissions seem suspicious Explanation: Unnecessary permissions can allow apps to misuse your data; decline them if they don’t align with the app’s purpose.
4. What should you do if an online store requests more personal information than usual, such as your Social Security number?
Answer: b) Close the website and consider shopping elsewhere Explanation: Reputable online stores do not typically require sensitive personal information like Social Security numbers.
5. What is “social engineering” in cybersecurity?
Answer: b) Manipulating people to gain unauthorized access Explanation: Social engineering involves tricking people into revealing information or access, bypassing security systems.
6. Why is it important to sign out of accounts on shared computers?
Answer: b) To protect your information from others using the device Explanation: Logging out prevents others from accessing your accounts and sensitive information on shared devices.
7. When setting up a smart home device, what’s a key step to keep it secure?
Answer: b) Change the default password and enable security settings Explanation: Default passwords are often easy for attackers to guess, so changing them is essential for device security.
8. Why is it important to have a backup of important files?
Answer: b) In case of accidental deletion or data loss due to cyber attacks Explanation: Regular backups ensure you can recover your data in the event of loss or ransomware attacks.
9. Which social media setting helps protect your privacy?
Answer: c) Limiting profile visibility to friends only Explanation: Restricting profile visibility ensures only trusted individuals can see your information, reducing privacy risks.
10. Which of the following is NOT a form of phishing?
Answer: c) An online article with general tech news Explanation: Phishing involves tricking users into providing personal information, often through fake emails or ads.