Security Awareness Quiz - Now Closed - Your Results Will Not Be Counted

10 Questions | Total Attempts: 40

SettingsSettingsSettings
Please wait...
Security Awareness Quiz - Now Closed - Your Results Will Not Be Counted


Questions and Answers
  • 1. 
    1. What does the “https://” at the beginning of a URL denote, as opposed to "http://" (without the “s”)? 
    • A. 

      That the site has special high definition

    • B. 

      That information entered into the site is encrypted

    • C. 

      That the site is the newest version available

    • D. 

      That the site is not accessible to certain computers

    • E. 

      None of the above

    • F. 

      Not sure

  • 2. 
    Which of the following is an example of a “phishing” attack?
    • A. 

      Sending someone an email that contains a malicious link that is disguised to look like an email from someone the person knows

    • B. 

      Creating a fake website that looks nearly identical to a real website in order to trick users into entering their login information

    • C. 

      Sending someone a text message that contains a malicious link that is disguised to look like a notification that the person has won a contest

    • D. 

      All of the above

    • E. 

      Not Sure

  • 3. 
    A group of computers that is networked together and used by hackers to steal information is called a …
    • A. 

      Botnet

    • B. 

      Rootkit

    • C. 

      DDoS

    • D. 

      Operating system

    • E. 

      Not sure

  • 4. 
    Some websites and online services use a security process called two-step authentication. Which of the following images is an example of two-step authentication?
    • A. 

      Option 1

    • B. 

      Option 2

    • C. 

      Option 3

    • D. 

      Option 4

  • 5. 
    Which of the following four passwords is the most secure?
    • A. 

      Boat123

    • B. 

      WTh!5Z

    • C. 

      Into*48

    • D. 

      123456

    • E. 

      Not sure

  • 6. 
    Criminals access someone’s computer and encrypt the user’s personal files and data. The user is unable to access this data unless they pay the criminals to decrypt the files. This practice is called …
    • A. 

      Botnet

    • B. 

      Ransomware

    • C. 

      Driving

    • D. 

      Spam

    • E. 

      None of the above

    • F. 

      Not sure

  • 7. 
    “Private browsing” is a feature in many internet browsers that lets users access web pages without any information (like browsing history) being stored by the browser. Can internet service providers see the online activities of their subscribers when those subscribers are using private browsing?
    • A. 

      YES

    • B. 

      NO

    • C. 

      Not Sure

  • 8. 
    Turning off the GPS function of your smartphone prevents any tracking of your phone’s location.
    • A. 

      True

    • B. 

      False

    • C. 

      Not sure

  • 9. 
    If a public Wi-Fi network (such as in an airport or café) requires a password to access, is it generally safe to use that network for sensitive activities such as online banking?
    • A. 

      Yes, it is safe

    • B. 

      No, it is not safe

    • C. 

      Not sure

  • 10. 
    What kind of cybersecurity risks can be minimized by using a Virtual Private Network (VPN)?
    • A. 

      Use of insecure Wi-Fi networks

    • B. 

      Key-logging

    • C. 

      De-anonymization by network operators

    • D. 

      Phishing attacks

    • E. 

      Not sure

Back to Top Back to top