Are You Secure Online? Is Internet Safe?

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Gregorynaomi
G
Gregorynaomi
Community Contributor
Quizzes Created: 1462 | Total Attempts: 774,877
Questions: 10 | Attempts: 241

SettingsSettingsSettings
Are You Secure Online? Is Internet Safe? - Quiz

The Internet has been of huge help to humanity. It has helped produce a world where virtual communication can start up. Data and information can be shared, kept online for a lifetime if not tampered with. Is the Internet save or not is knowledge worth having. Take this quiz to unravel the secret!


Questions and Answers
  • 1. 

    Which of these is not an internet safety issue?

    • A.

      Phishing 

    • B.

      Internet scams 

    • C.

      Cyber war

    • D.

      Phishing 

    Correct Answer
    C. Cyber war
    Explanation
    Cyber war is not considered an internet safety issue because it refers to large-scale attacks between nations or organizations, rather than individual safety concerns. Internet safety issues typically involve personal data breaches, online scams, and phishing attempts, which aim to deceive individuals and steal their information. While cyber war can have broader implications for national security and infrastructure, it is not directly related to the safety of individual internet users.

    Rate this question:

  • 2. 

    Which of these is not an information security breach? 

    • A.

      Phishing 

    • B.

      Spyware 

    • C.

      Cyber bully 

    • D.

      Internet scams 

    Correct Answer
    C. Cyber bully 
    Explanation
    Cyber bullying is not considered an information security breach because it does not involve unauthorized access or disclosure of sensitive information. It refers to the act of harassing, intimidating, or threatening individuals online, usually through social media platforms. While cyber bullying can have serious emotional and psychological impacts, it does not directly compromise the security or confidentiality of information. On the other hand, phishing, spyware, and internet scams are all types of security breaches that involve attempts to steal personal information, install malicious software, or deceive individuals for financial gain.

    Rate this question:

  • 3. 

    Which of these is when a scammer disguise as a trustworthy source to get private information? 

    • A.

      Internet scam 

    • B.

      Spyware 

    • C.

      Phishing 

    • D.

      Identity theft

    Correct Answer
    C. Phishing 
    Explanation
    Phishing is when a scammer pretends to be a trustworthy source in order to deceive individuals into providing their private information. This is typically done through emails, text messages, or websites that appear legitimate but are actually fraudulent. The scammer uses various tactics to trick people into revealing sensitive information such as passwords, social security numbers, or credit card details. This information is then used for fraudulent purposes, such as identity theft or financial fraud.

    Rate this question:

  • 4. 

    Which of these is a scheme to deceive a user and take advantage of them? 

    • A.

      Internet scam 

    • B.

      Confidence tricks 

    • C.

      Malware 

    • D.

      Spyware 

    Correct Answer
    A. Internet scam 
    Explanation
    An internet scam refers to a scheme designed to deceive users and exploit them for personal gain. Scammers typically use various tactics such as fake websites, phishing emails, or fraudulent online transactions to trick individuals into providing sensitive information or money. They may pose as trustworthy entities or offer too-good-to-be-true deals to entice victims. Once the user falls for the scam, the scammer gains unauthorized access to their personal or financial information, leading to potential financial loss or identity theft.

    Rate this question:

  • 5. 

    Which of these is a malicious software designed to collect private information? 

    • A.

      Hardware 

    • B.

      Software 

    • C.

      Spyware 

    • D.

      Mail ware 

    Correct Answer
    C. Spyware 
    Explanation
    Spyware is a type of malicious software that is specifically designed to collect private information without the user's knowledge or consent. It infiltrates a user's device and secretly monitors their online activities, collects sensitive data such as passwords, credit card details, and personal information, and sends it to a third party. Spyware is a serious threat to privacy and can lead to identity theft, financial loss, and other harmful consequences.

    Rate this question:

  • 6. 

    What is the use of internet to harass someone called? 

    • A.

      Phishing 

    • B.

      Internet scam 

    • C.

      Cyberstalking 

    • D.

      Cyberbullying 

    Correct Answer
    C. Cyberstalking 
    Explanation
    Cyberstalking is the use of the internet to harass someone, which aligns with the question. Phishing refers to the act of tricking individuals into revealing personal information, while internet scam involves fraudulent activities online. Cyberbullying refers to the act of harassing or intimidating someone online, but it is not specifically related to the use of the internet to harass someone. Therefore, the correct answer is Cyberstalking.

    Rate this question:

  • 7. 

    What is the act of engaging an underage minor in online sexual act? 

    • A.

      Dating 

    • B.

      Cyber rape 

    • C.

      Rape 

    • D.

      Online predation 

    Correct Answer
    D. Online predation 
    Explanation
    Online predation refers to the act of engaging an underage minor in online sexual activities. This can involve grooming, manipulation, and exploitation of the minor for sexual purposes. It is a form of child exploitation and is considered a serious crime. The term "online predation" encompasses various actions such as soliciting explicit images, engaging in sexual conversations, or arranging in-person meetings with the intent of sexual abuse. It is important to raise awareness about online predation and take measures to protect minors from such harmful activities.

    Rate this question:

  • 8. 

    Which of these usually involve blackmail? 

    • A.

      Cyberbullying 

    • B.

      Sextortion 

    • C.

      Online predation 

    • D.

      Cyberstalking 

    Correct Answer
    B. Sextortion 
    Explanation
    Sextortion usually involves blackmail, where a person is coerced into providing explicit images or engaging in sexual acts, and the blackmailer threatens to share the content publicly or with the victim's friends and family if they do not comply with their demands. This form of online extortion is a growing concern in the digital age, as it can have severe emotional and psychological consequences for the victims involved.

    Rate this question:

  • 9. 

    Which of these is an attack on a person or individual? 

    • A.

      Cyberstalking

    • B.

      Cyberbullying 

    • C.

      Online predation 

    • D.

      Obscene content 

    Correct Answer
    B. Cyberbullying 
    Explanation
    Cyberbullying is an attack on a person or individual through the use of electronic communication, such as social media or messaging platforms. It involves repeated and intentional harassment, intimidation, or humiliation, often with the intention to harm or control the victim. This form of online aggression can have severe psychological and emotional effects on the victim, leading to anxiety, depression, and even suicide in extreme cases. It is important to address and combat cyberbullying to create a safe and inclusive online environment.

    Rate this question:

  • 10. 

    Which of these the medium through extortion occurs? 

    • A.

      Social media 

    • B.

      Webcam 

    • C.

      Instant messaging 

    • D.

      Mail 

    Correct Answer
    B. Webcam 
    Explanation
    Extortion is the act of obtaining something, usually money, through force or threats. In the context of the question, the medium through which extortion occurs is the webcam. This suggests that the act of extortion is carried out by exploiting or threatening someone through their webcam, possibly by capturing compromising or sensitive images or videos and using them as leverage to extort money or other concessions from the victim.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 28, 2019
    Quiz Created by
    Gregorynaomi
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.