Security Awareness Quiz - Now Closed - Your Results Will Not Be Counted

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Collpark
C
Collpark
Community Contributor
Quizzes Created: 1 | Total Attempts: 384
| Attempts: 384 | Questions: 10
Please wait...
Question 1 / 10
0 %
0/100
Score 0/100
1. If a public Wi-Fi network (such as in an airport or café) requires a password to access, is it generally safe to use that network for sensitive activities such as online banking?

Explanation

Even if a public Wi-Fi network requires a password, other users can potentially view the sensitive information a user sends across that Wi-Fi network.

Submit
Please wait...
About This Quiz
Security Awareness Quiz - Now Closed - Your Results Will Not Be Counted - Quiz

This closed quiz covers key cybersecurity concepts, including secure web protocols, phishing, botnets, two-step authentication, strong passwords, and ransomware.

2. Which of the following four passwords is the most secure?

Explanation

This password contains the basic elements of a strong password recommended by experts. It contains a combination of letters, numbers and symbols; it includes both upper and lower case letters; and it does not contain any words from the dictionary.

Submit
3. Criminals access someone's computer and encrypt the user's personal files and data. The user is unable to access this data unless they pay the criminals to decrypt the files. This practice is called …

Explanation

Driving is short for for “war driving,” which is a technique where hackers drive around an area looking for insecure Wi-Fi networks.

Submit
4. 1. What does the "https://" at the beginning of a URL denote, as opposed to "https://" (without the "s")? 

Explanation

Encrypting information entered into a website makes it far more difficult for anyone other than the user and website owner to read the information. As of February 2017, around half of all internet traffic is now encrypted.

Submit
5. "Private browsing" is a feature in many internet browsers that lets users access web pages without any information (like browsing history) being stored by the browser. Can internet service providers see the online activities of their subscribers when those subscribers are using private browsing?

Explanation

Private browsing prevents a user’s internet browser from storing certain kinds of files on his or her device. However, internet service providers can still see all of the details of the user's web traffic.

Submit
6. Which of the following is an example of a "phishing" attack?

Explanation

Phishing attacks attempt to get a user to click on a malicious link or file by impersonating a trusted source the user is familiar with. All three of the choices listed are examples of a phishing attack.

Submit
7. A group of computers that is networked together and used by hackers to steal information is called a …

Explanation

A rootkit is a type of malicious software designed to gain unauthorized access to a computer system. DDoS stands for Distributed Denial of Service, it is an attack where large amounts of requests are sent to a web server in order to overwhelm the server and shut it down.

Submit
8. Some websites and online services use a security process called two-step authentication. Which of the following images is an example of two-step authentication?

Explanation

This is the only example of two-step authentication listed – true two-step authentication requires the user to enter a one-time code each time they log in to their account, in addition to their regular username and password. While the other answers may require users to perform two separate operations to gain access to a site, they are not examples of two-step authentication.

Submit
9. Turning off the GPS function of your smartphone prevents any tracking of your phone's location.

Explanation

In addition to GPS, smartphones can also be tracked using the cellphone towers or Wi-Fi networks that the phone is connected to.

Submit
10. What kind of cybersecurity risks can be minimized by using a Virtual Private Network (VPN)?

Explanation

A Virtual Private Network (VPN) allows users to create an encrypted connection between their devices and the internet, making it much harder for anyone other than the user to see their activity

Submit
View My Results

Quiz Review Timeline (Updated): Mar 20, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 06, 2017
    Quiz Created by
    Collpark
Cancel
  • All
    All (10)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
If a public Wi-Fi network (such as in an airport or café)...
Which of the following four passwords is the most secure?
Criminals access someone's computer and encrypt the user's personal...
1. What does the "https://" at the beginning of a URL denote, as...
"Private browsing" is a feature in many internet browsers that lets...
Which of the following is an example of a "phishing" attack?
A group of computers that is networked together and used by hackers to...
Some websites and online services use a security process called...
Turning off the GPS function of your smartphone prevents any tracking...
What kind of cybersecurity risks can be minimized by using a Virtual...
Alert!

Advertisement