Internet Security Quiz - Brian Leng

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Teleleng
T
Teleleng
Community Contributor
Quizzes Created: 1 | Total Attempts: 384
Questions: 10 | Attempts: 384

SettingsSettingsSettings
Internet Security Quizzes & Trivia

A quiz to test the intelligence of students when it comes to internet safety and security.


Questions and Answers
  • 1. 

    While playing your favorite online game, a small window pops up. It tells you that you are the 100,000th visitor of the website, and you have won a free Wii console. All it needs is your street address and your phone number. What do you do?

    • A.

      Type in both your street address and your phone number, then press Ok. Hey, it's a free gaming system right?

    • B.

      Type in your street address, but put a fake phone number. Press Ok.

    • C.

      Immediately close the link, refusing the offer.

    • D.

      Party and party and yeah!

    Correct Answer
    C. Immediately close the link, refusing the offer.
    Explanation
    The correct answer is to immediately close the link, refusing the offer. This is because the pop-up window is likely a scam or phishing attempt. Legitimate websites do not randomly give away prizes to visitors, especially without any prior participation or notification. Providing personal information such as your street address and phone number to unknown sources can lead to identity theft or other fraudulent activities. It is always safer to be cautious and avoid sharing personal information with suspicious sources.

    Rate this question:

  • 2. 

    You notice that your computer has been acting strange lately. Random pop-ups keep popping up. When you open up your internet browser, the homepage is different than what you set it to be. Toolbars you have never seen before suddenly appear. You keep getting random error messages. Your firewall has not been on for weeks, because you turned it off to download your favorite flash game. What do you do to fix it?

    • A.

      You can't.Trash your computer and get a new one.

    • B.

      Re-install your internet browser or use a different one.

    • C.

      Delete the flash game you downloaded.

    • D.

      Run your firewall for maximum security and delete all your cookies.

    Correct Answer
    D. Run your firewall for maximum security and delete all your cookies.
    Explanation
    The given correct answer suggests that running the firewall for maximum security and deleting all cookies can help fix the computer's issues. By running the firewall, it can block any unauthorized access or malware that may be causing the strange behavior. Deleting cookies can help remove any potentially malicious files or data that may be stored on the computer. Re-installing the internet browser or using a different one may also be a possible solution, but it is not mentioned as the correct answer. Deleting the flash game may not necessarily fix the problem if the issue is caused by other factors.

    Rate this question:

  • 3. 

    It is 20 years into the future, where you can check your email daily. Right now, you are doing one of your email checks.You see an email that says "Free Gift, Act Now!" When you open it up, you see that it wants to give you a free $100 Target gift card. It asks for your credit card number. What do you do?

    • A.

      Put a friend's credit card.

    • B.

      Put your credit card number for the free gift card.

    • C.

      Delete the email and count it as spam.

    • D.

      Forward the email to all your friends.

    Correct Answer
    C. Delete the email and count it as spam.
    Explanation
    Putting a friend's credit card or providing your own credit card number in response to an email claiming to offer a free gift card is not a safe or advisable action. This is likely a phishing scam attempting to steal personal and financial information. Deleting the email and considering it as spam is the correct response to protect oneself from potential fraud or identity theft.

    Rate this question:

  • 4. 

    You recently found out that a website you signed up for got hacked. Your account and all the private information in it may be viewable. However, you haven't been on the website for years, and you completely forgot about it until now. What do you do?

    • A.

      Ignore it, since you haven't been on the website for years, then the hack is probably harmless.

    • B.

      Change all your passwords immediately.

    • C.

      Change all your personal info.

    • D.

      Throw away your computer, because it is infected now.

    Correct Answer
    B. Change all your passwords immediately.
    Explanation
    Changing all your passwords immediately is the best course of action in this situation. Even if you haven't been on the website for years, there is still a risk that your account and private information could be compromised. Changing your passwords will help protect your other accounts and prevent unauthorized access to your personal information. It is not necessary to throw away your computer or change all your personal info unless there is evidence of a broader security breach.

    Rate this question:

  • 5. 

    What can a virus do to your PC?

    • A.

      Steal your passwords and usernames from different websites.

    • B.

      Install random things on your computer that you don't want.

    • C.

      Completely shut down your computer in a way that it is unusable.

    • D.

      All of the Above

    Correct Answer
    D. All of the Above
    Explanation
    A virus can do various harmful activities to your PC. It can steal your passwords and usernames from different websites, compromising your online security. Additionally, it can install random things on your computer without your consent, cluttering your system and potentially introducing more malware. Furthermore, a virus can completely shut down your computer in a way that renders it unusable, causing inconvenience and potential data loss. Therefore, the correct answer is "All of the Above."

    Rate this question:

  • 6. 

    You are on Facebook and your mathematics teacher posted on your wall a claimed video of Osama getting shot. It comes with the following caption: "LOL, check this out!!!!!! this is the real thing dude!!!" It shows a picture of a bloody Osama and has a weird link with random characters. You notice that your mathematics teacher also sent the same video and the same caption to all of his 500 friends. What now?

    • A.

      Ignore it or delete it.

    • B.

      Click the link and watch the video!

    • C.

      Post it on your friend's wall for confirmation.

    • D.

      Wait until your teacher posts something else, then click it.

    Correct Answer
    A. Ignore it or delete it.
    Explanation
    The correct answer is to ignore it or delete it because the video and caption seem suspicious. It is unusual for a mathematics teacher to post such content, especially with a strange link. Additionally, the fact that the teacher sent the same video and caption to all 500 friends raises further concerns about the authenticity and safety of the content. It is best to err on the side of caution and not engage with potentially harmful or malicious content.

    Rate this question:

  • 7. 

    Where do you report a phishing link?

    Correct Answer
    C. [email protected]
    Explanation
    To report a phishing link, you should send an email to [email protected]. This email address belongs to the U.S. Federal Trade Commission's (FTC) spam reporting center, known as the "UCE" or "Unsolicited Commercial Email" center. By reporting the phishing link to this email address, you are providing valuable information to the FTC, which helps them investigate and take action against those responsible for sending spam and phishing emails.

    Rate this question:

  • 8. 

    What is NOT necessary to do when you have been a victim of identity theft?

    • A.

      Close all your accounts.

    • B.

      Report it to the Federal Trade Commission.

    • C.

      File a police report.

    • D.

      Tell your family and friends about it, so they could be aware of it.

    Correct Answer
    D. Tell your family and friends about it, so they could be aware of it.
    Explanation
    When you have been a victim of identity theft, it is not necessary to tell your family and friends about it so they could be aware of it. While it may be helpful to inform your loved ones about the situation, it is not a necessary step in resolving the issue. The important steps to take include closing all your accounts, reporting it to the Federal Trade Commission, and filing a police report. These actions will help protect your financial accounts and assist in investigating the crime.

    Rate this question:

  • 9. 

    What is a good password to put to avoid being hacked?

    • A.

      Password

    • B.

      C@ts

    • C.

      Appletreemonkey

    • D.

      Br1@n22

    Correct Answer
    D. Br1@n22
    Explanation
    The password "br1@n22" is a good choice to avoid being hacked because it includes a combination of uppercase and lowercase letters, numbers, and special characters. This makes it more difficult for hackers to guess or crack the password. Additionally, the use of a unique and unrelated word like "br1@n22" further enhances its strength.

    Rate this question:

  • 10. 

    What is the difference between spyware and malware?

    • A.

      They are basically the same thing, so nothing.

    • B.

      Malware is way more serious.

    • C.

      Spyware is a form of malware.

    • D.

      Spyware is any mallacious software, malware is a special type of it.

    Correct Answer
    C. Spyware is a form of malware.
    Explanation
    The correct answer is that spyware is a form of malware. This means that while spyware falls under the broader category of malware, it is a specific type of malicious software that is designed to gather information without the user's consent. Other types of malware may have different purposes, such as causing damage to a computer system or stealing personal information. Therefore, spyware can be considered a subset of malware, but not all malware is spyware.

    Rate this question:

Related Topics

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.