1. What is “social engineering” in the context of cybersecurity?
Answer: b) Manipulating people to reveal confidential information Explanation: Social engineering exploits human psychology rather than technical vulnerabilities to gain unauthorized access.
2. What should you be cautious about when using social media “quizzes” that ask for personal details?
Answer: b) They may collect data to guess security answers Explanation: Quizzes can collect information that could help attackers guess your password or security answers.
3. What does a “strong” password policy recommend?
Answer: b) Use complex, unique passwords for each account Explanation: Strong, unique passwords improve security and prevent attackers from accessing multiple accounts.
4. Why is it risky to download software from unofficial websites?
Answer: b) You might receive malware with the software Explanation: Unofficial sites often host modified or malicious versions of software that can compromise security.
5. What’s the purpose of a firewall?
Answer: b) To filter incoming and outgoing network traffic for potential threats Explanation: Firewalls protect systems by blocking potentially malicious traffic, helping to secure your network.
6. What does “data encryption” do?
Answer: a) Converts data into a format only readable with a decryption key Explanation: Encryption secures information, making it inaccessible without the correct decryption key.
7. What should you do if your device prompts you to install an unexpected update?
Answer: b) Verify the update’s authenticity first Explanation: Ensuring updates are legitimate prevents malicious software from being installed on your device.
8. What is “clickjacking”?
Answer: b) A malicious technique where a user is tricked into clicking something different than expected Explanation: Clickjacking hides harmful links under legitimate buttons, leading users to take unintended actions.
9. Why should you avoid using public Wi-Fi for online shopping or banking?
Answer: b) Hackers can intercept your information on unsecured networks Explanation: Public Wi-Fi is vulnerable to cyberattacks; it’s best to wait until you’re on a secure network or use a VPN.
10. Why is it important to have a backup of important files?
Answer: b) In case of accidental deletion or data loss due to cyber attacks Explanation: Regular backups ensure you can recover your data in the event of loss or ransomware attacks.