Avoid Being Hacked: What Would You Do?

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Communications
C
Communications
Community Contributor
Quizzes Created: 3 | Total Attempts: 3,509
Questions: 8 | Attempts: 992

SettingsSettingsSettings
Avoid Being Hacked: What Would You Do? - Quiz

Think you have what it takes to protect yourself from hackers? Take the quiz and find out.


Questions and Answers
  • 1. 

    You receive an email stating that your account has been hacked. The email provides a link where you should verify and adjust your personal information. Should you click this link?

    • A.

      Yes. You should make sure your personal information has not been compromised.

    • B.

      No, if you have concerns regarding your account, call your bank directly to discuss your account.

    • C.

      No. Send a reply email containing your personal information. A bank employee can check your information against their records.

    Correct Answer
    B. No, if you have concerns regarding your account, call your bank directly to discuss your account.
    Explanation
    The correct answer is to not click the link and instead call your bank directly to discuss your account. Clicking on the link provided in the email can potentially lead to further compromise of your personal information or installation of malware on your device. It is always safer to directly contact your bank using their official contact information to verify any security concerns regarding your account.

    Rate this question:

  • 2. 

    You should delete an unsolicited email if it requests which of the following information: 

    • A.

      Your Social Security Number.

    • B.

      Your Network ID and/or password.

    • C.

      Your Date of Birth.

    • D.

      Your Bank Account or Credit Card Number.

    • E.

      All the above.

    Correct Answer
    E. All the above.
    Explanation
    The correct answer is "All the above." This means that if an unsolicited email asks for any of the mentioned information, including the Social Security Number, Network ID and/or password, Date of Birth, or Bank Account or Credit Card Number, it should be deleted. This is because providing such sensitive information to unknown sources can lead to identity theft, fraud, or other forms of cybercrime. It is important to always be cautious and protect personal information online.

    Rate this question:

  • 3. 

    You should delete an unsolicited email if it contains which of the following features:

    • A.

      An unusual “From” address.

    • B.

      A grammatical error.

    • C.

      An unusual “Reply-To” address.

    • D.

      A & C.

    • E.

      All the above.

    Correct Answer
    D. A & C.
    Explanation
    If an unsolicited email contains an unusual "From" address, it is advisable to delete it as it may indicate that the email is from an untrustworthy source. Similarly, if the email has an unusual "Reply-To" address, it can be a red flag for potential spam or phishing attempts. Therefore, deleting emails that have both these features (A & C) is a recommended practice to maintain online security and protect against potential threats.

    Rate this question:

  • 4. 

    You're a new Associate and you receive an email from your system administrator requesting your Network ID & password for administrative purposes. This request is legitimate.

    • A.

      True.

    • B.

      False.

    Correct Answer
    B. False.
    Explanation
    The correct answer is False because it is not safe or appropriate to share your Network ID and password with anyone, even if they claim to be a system administrator. Legitimate system administrators would not request this information via email as it can lead to security breaches and unauthorized access to sensitive information. It is important to always verify the legitimacy of such requests through other means of communication, such as contacting the administrator directly or consulting with your supervisor.

    Rate this question:

  • 5. 

    A pop-up window opens on your computer that says your security has been compromised. You are prompted to enter your credit card information and password to upgrade your operating system and prevent the loss of sensitive data. What should you do? 

    • A.

      Enter the requested information, click OK and cross your fingers.

    • B.

      Close the pop-up window and back up your data.

    • C.

      Unplug your Ethernet cable.

    Correct Answer
    B. Close the pop-up window and back up your data.
    Explanation
    The correct answer is to close the pop-up window and back up your data. This is because the pop-up window is most likely a phishing attempt or a scam. Legitimate security alerts would not ask for credit card information or passwords in a pop-up window. By closing the window, you can avoid potentially compromising your sensitive data. Backing up your data is also important as a precautionary measure in case any security issues arise.

    Rate this question:

  • 6. 

    When you get an unexpected attachment in an e-mail from someone that you know, you should:

    • A.

      Open the attachment and then save it to your hard disk.

    • B.

      Open the attachment, but if it has a virus, close it immediately.

    • C.

      Send a separate e-mail to the sender to verify that the person really intended to send it before you open the attachment.

    • D.

      Respond to the e-mail, asking what the attachment contains.

    Correct Answer
    C. Send a separate e-mail to the sender to verify that the person really intended to send it before you open the attachment.
    Explanation
    The correct answer is to send a separate email to the sender to verify that the person really intended to send it before opening the attachment. This is a precautionary measure to ensure the safety of your computer and personal information. Opening unexpected attachments can potentially expose your computer to viruses or malware. By confirming with the sender before opening the attachment, you can avoid any potential risks and ensure that the attachment is legitimate.

    Rate this question:

  • 7. 

    Instant messaging (IM) is a great way to chat with friends online without having to worry about viruses.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    This statement is false because instant messaging (IM) can still be a source of viruses. While it is true that IM is generally considered safer than other forms of online communication like email, it is not completely immune to viruses. Users can still receive malicious links or files through IM, which can potentially infect their devices with viruses. Therefore, it is important to exercise caution and use security measures even when using instant messaging.

    Rate this question:

  • 8. 

    After you install anti-virus software on your computer, you don’t have to worry about a virus attack on your computer

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Installing anti-virus software on your computer does not guarantee complete protection against virus attacks. While anti-virus software can significantly reduce the risk of infection, it is not foolproof. New viruses are constantly being developed, and it takes time for anti-virus software to update and detect them. Additionally, some viruses may bypass the software's detection capabilities. Therefore, it is important to regularly update the anti-virus software and practice safe browsing habits to minimize the chances of a virus attack.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jun 24, 2009
    Quiz Created by
    Communications
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.