1. Which of these is a telltale sign of a potentially malicious website?
Answer: b) It has numerous pop-up ads Explanation: Malicious sites often flood visitors with pop-ups to trigger downloads or redirect users to unsafe content.
2. Why is it important to verify a website’s URL before entering personal information?
Answer: a) To ensure the website is secure and authentic Explanation: Checking the URL helps confirm you’re on the intended, legitimate site and not a phishing page.
3. What does it mean to “sandbox” an application?
Answer: b) To isolate it in a secure environment for testing Explanation: Sandboxing allows apps to run in isolation, reducing the risk of harm to your main system.
4. Which of the following is a good example of multi-factor authentication?
Answer: b) A password and a text message verification code Explanation: Multi-factor authentication combines two or more verification methods to provide added security.
5. What should you avoid doing on public Wi-Fi networks?
Answer: b) Logging into personal accounts or conducting financial transactions Explanation: Public Wi-Fi is often unsecured, making it easier for attackers to intercept your data.
6. What’s the safest way to handle an attachment from an unknown email sender?
Answer: c) Scan it with antivirus software before opening Explanation: Scanning attachments first helps identify and avoid malware that could harm your device or steal data.
7. Why is it a good idea to check the permissions an app requests before installing it?
Answer: c) To avoid giving unnecessary access to sensitive data Explanation: Apps sometimes request permissions that aren’t needed for functionality, which could be used to collect or misuse data.
8. Why is it risky to reuse the same password across multiple accounts?
Answer: b) If one account is compromised, others are at risk Explanation: Reusing passwords makes it easier for attackers to gain access to multiple accounts if they crack one.
9. What should you do if an app asks for excessive permissions, like access to your contacts and location?
Answer: c) Decline and uninstall if permissions seem suspicious Explanation: Unnecessary permissions can allow apps to misuse your data; decline them if they don’t align with the app’s purpose.
10. What’s an example of a secure public Wi-Fi habit?
Answer: a) Using a VPN when connecting Explanation: A VPN encrypts data, providing more security on public Wi-Fi by protecting against interception.