How Cyber Secure Are You

  • ISO/IEC 27001
  • NIST SP 800-53
Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Tammylfinch
T
Tammylfinch
Community Contributor
Quizzes Created: 1 | Total Attempts: 182
| Attempts: 182 | Questions: 10
Please wait...
Question 1 / 10
0 %
0/100
Score 0/100
1. You have no idea what kind of anti-virus and anti-spyware protection your computer has, or whether you have a firewall. You should:

Explanation

It is important to check the software on your computer to see if it is active and up-to-date because outdated or inactive security software can leave your computer vulnerable to viruses and spyware. Additionally, it is recommended to get new or updated security from a site or store you know and trust to ensure that you are downloading legitimate and reliable software.

Submit
Please wait...
About This Quiz
Cybersecurity Quizzes & Trivia

Take the quiz to see how cyber saavy you are!

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. Your computer came out of the box a month ago with an operating system (like MAC OS, Windows, or Linux) and you chose a web browser (like Firefox, or Internet Explorer). You haven't updated either since then. You should:

Explanation

The correct answer is to change the settings on both the operating system and web browser to increase online security and set the operating system to automatically download and install security patches. This is because not updating the operating system and web browser can leave them vulnerable to security threats. By changing the settings to increase online security and enabling automatic security patch updates, the computer will be better protected against potential threats.

Submit
3. Before you enter your personal information online you should find out:

Explanation

The correct answer is "All of the above" because before entering personal information online, it is important to know how the company collecting the information will protect it, why the company needs the information, and with whom it might be shared. This ensures that individuals are aware of the privacy and security measures in place, the purpose of collecting their information, and the potential risks associated with sharing it.

Submit
4. The optimal length and type of a computer password is

Explanation

An optimal computer password should have a length of eight or more characters and should include a combination of letters, numbers, and symbols. This ensures that the password is strong and less susceptible to being guessed or hacked. A six-character word may be easy to remember, but it may not provide enough security. Using something personal like a middle name spelled backwards can also be easily guessed by someone who knows the person well. Using the word "password" as a password is highly insecure as it is one of the most commonly used and easily guessed passwords.

Submit
5. If you receive an email or text message from your service provider, bank, or other institution you are familiar with asking for your password to fix a problem, you should always send it to them promptly to avoid your account being compromised.

Explanation

Sending your password to anyone, even if it is a service provider or bank that you are familiar with, is not a safe practice. Legitimate institutions will never ask for your password via email or text message. This is a common phishing scam where hackers try to trick you into revealing your password. It is important to always be cautious and never share your password with anyone.

Submit
6. Your bank sends you an email asking for your personal information- your account number, password and social security #. You should

Explanation

The correct answer is to delete the email. This is because it is not safe to provide personal information through email, especially if you are unsure about its legitimacy. Calling the company's customer service line using the phone number on your billing statement is a safer option to verify the email's authenticity.

Submit
7. What type of free software may include spyware?

Explanation

All of the above options, including electronic games, screen savers, toolbars, and even anti-spyware software, may include spyware. This means that any type of free software can potentially have spyware embedded in it, which can track and collect user data without their knowledge or consent. It is important to be cautious when downloading and installing free software and to use reliable sources to minimize the risk of spyware.

Submit
8. What might it mean if your computer slows down, displays repeated error messages, serves up a lot of pop up ads, and appears to send emails that you did not write?

Explanation

If your computer slows down, displays repeated error messages, serves up a lot of pop-up ads, and appears to send emails that you did not write, it likely means that your computer is infected with spyware. Spyware is malicious software that is designed to gather information about a person or organization without their knowledge. It can cause various issues, including slowing down the computer's performance, displaying unwanted ads, and even sending out emails without the user's consent.

Submit
9. What are ways to avoid being scammed by spam

Explanation

The correct answer is "All of the above". This is because knowing the identity, address, and phone number of the companies you are dealing with online can help you verify their legitimacy and avoid falling for scams. Protecting your personal and credit card information is crucial to prevent scammers from accessing your sensitive data and using it for fraudulent activities. Getting promises in writing before making online purchases ensures that you have a record of the agreement and can hold the seller accountable if they fail to deliver as promised. Therefore, following all of these practices can help individuals avoid being scammed by spam.

Submit
10. Which of these is not a step to take after receiving what appears to be a spam email?

Explanation

Forwarding the email to a friend is not a step to take after receiving what appears to be a spam email. The other options provided are all valid steps to take: forwarding the email to spam @uce.gov and to any organization the spam is impersonating, deleting the email, and being skeptical. Forwarding the email to a friend may potentially spread the spam further or cause unnecessary concern for the friend.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 19, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 19, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 11, 2011
    Quiz Created by
    Tammylfinch
Cancel
  • All
    All (10)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
You have no idea what kind of anti-virus and anti-spyware protection...
Your computer came out of the box a month ago with an operating system...
Before you enter your personal information online you should find out:
The optimal length and type of a computer password is
If you receive an email or text message from your service provider,...
Your bank sends you an email asking for your personal information-...
What type of free software may include spyware?
What might it mean if your computer slows down, displays repeated...
What are ways to avoid being scammed by spam
Which of these is not a step to take after receiving what appears to...
Alert!

Advertisement