1. How often should you change your Wi-Fi password?
Answer: b) When you suspect unauthorized access or after sharing it with others Explanation: Changing Wi-Fi passwords limits unauthorized access and keeps your network secure.
2. What does “data encryption” do?
Answer: a) Converts data into a format only readable with a decryption key Explanation: Encryption secures information, making it inaccessible without the correct decryption key.
3. What is “social engineering” in cybersecurity?
Answer: b) Manipulating people to gain unauthorized access Explanation: Social engineering involves tricking people into revealing information or access, bypassing security systems.
4. What does a “strong” password policy recommend?
Answer: b) Use complex, unique passwords for each account Explanation: Strong, unique passwords improve security and prevent attackers from accessing multiple accounts.
5. How can you tell if an email link might be a phishing attempt?
Answer: a) The link is unusually long or uses a URL shortener Explanation: Phishing links are often disguised using URL shorteners or random characters. Hovering over the link can reveal its true destination.
6. Which of the following is NOT a secure practice when browsing the internet?
Answer: c) Entering sensitive information on public Wi-Fi Explanation: Public Wi-Fi is often insecure, making it easier for attackers to intercept data. Avoid entering sensitive information on these networks.
7. What does a “firewall” do?
Answer: b) Monitors and controls incoming and outgoing network traffic Explanation: A firewall filters traffic, blocking potentially dangerous data from reaching your device.
8. What can a VPN (Virtual Private Network) do for your online privacy?
Answer: b) Protect your IP address and encrypt your internet traffic Explanation: VPNs add a layer of privacy by encrypting your traffic and hiding your IP, making it harder to track your activities.
9. Why should you avoid posting real-time travel details on social media?
Answer: b) It informs potential intruders that your home is empty Explanation: Sharing travel plans in real-time increases security risks, as it reveals when your home might be vacant.
10. Which of the following is the most secure way to handle sensitive files online?
Answer: a) Share them via encrypted email or cloud service Explanation: Encryption ensures that only the intended recipient can access the sensitive information.