Amina Allison
1. What is a “zero-day” vulnerability?
Answer: b) A security flaw that attackers exploit before the developer has a patch Explanation: Zero-day vulnerabilities are dangerous because they’re exploited before they can be patched.
2. How often should you change your Wi-Fi password?
Answer: b) When you suspect unauthorized access or after sharing it with others Explanation: Changing Wi-Fi passwords limits unauthorized access and keeps your network secure.
3. What is “pharming” in the context of cybersecurity?
Answer: b) Redirecting users to fake websites without their knowledge Explanation: Pharming involves redirecting users to fraudulent sites, often to steal credentials or personal information.
4. What is the best way to respond to a friend who asks for money through social media messaging?
Answer: b) Call or message them outside the platform to verify Explanation: Verifying outside the platform ensures it’s really your friend asking and not an imposter.
5. What is “ransomware”?
Answer: b) Malicious software that locks data and demands payment for access Explanation: Ransomware encrypts or locks your files, demanding a ransom to unlock them, often targeting personal and corporate data.
6. What’s an effective way to protect your online accounts beyond a password?
Answer: a) Using multi-factor authentication (MFA) Explanation: MFA requires multiple verification steps, making it much harder for unauthorized users to access your accounts.
7. What should you do if you accidentally open a suspicious email attachment?
Answer: b) Disconnect from the internet and scan for malware immediately Explanation: Disconnecting helps prevent malware from spreading, and scanning detects any malicious software.
8. Which is a sign of a legitimate online store?
Answer: a) It has an SSL certificate (HTTPS) Explanation: HTTPS ensures secure data transmission, while lack of contact options can be a red flag for phishing or scam sites.
9. What’s the primary purpose of two-factor authentication (2FA)?
Answer: b) To add an extra layer of security to your accounts Explanation: 2FA provides an additional step for verifying identity, making unauthorized access more difficult.
10. Which of these passwords is the most secure?
Answer: b) “mydogFido2023!” Explanation: Strong passwords combine letters, numbers, and symbols, making them harder to guess or crack.