1.
What should you do if you receive an unsolicited email asking for personal information?
Correct Answer
B. Report it as spam
Explanation
Reporting an unsolicited email as spam is crucial for protecting your personal information. Unsolicited emails often contain links that can lead to phishing sites designed to steal your data. By marking these emails as spam, you help email providers improve their filters to catch similar emails in the future, reducing the risk for yourself and others. Additionally, this action prevents the sender from knowing that your email account is active, which might otherwise encourage more spam or malicious emails aimed at extracting sensitive information or installing malware.
2.
How can you create a strong password?
Correct Answer
B. Use a mix of letters and numbers
Explanation
Creating a strong password involves using a combination of letters, numbers, and special characters to increase the complexity and reduce the likelihood of being guessed or cracked by automated tools. Strong passwords are crucial for securing accounts against unauthorized access. By avoiding simple words and predictable patterns, and instead opting for a mix of different character types, you make it significantly harder for cyber attackers to gain access to your personal and financial information.
3.
What is the safest action to take when using public Wi-Fi?
Correct Answer
D. Always use a VPN
Explanation
Using a VPN (Virtual Private Network) when connected to public Wi-Fi ensures that your internet connection is encrypted and secure. Public Wi-Fi networks are often unsecured, making them vulnerable to intercepting by cybercriminals who can steal data like passwords and credit card numbers. A VPN hides your IP address and encrypts your internet traffic, which prevents hackers from accessing your data even if they are on the same network.
4.
What should you do if you notice a friend being cyberbullied?
Correct Answer
D. Report the bullying to an adult
Explanation
Reporting cyberbullying to an adult is an effective way to stop it and support the victim. Adults can take more substantial actions like contacting the bully’s parents, school authorities, or even law enforcement if the situation escalates. Telling an adult helps to document the incidents and ensures that the appropriate steps are taken to protect the individual being bullied and hold the perpetrator accountable.
5.
How can you protect your personal information online?
Correct Answer
D. All of the above
Explanation
Protecting your personal information online is best achieved through a combination of sharing data only on trusted sites, using strict privacy settings on social media, and ideally, avoiding sharing sensitive information altogether. Trusted sites often have robust security measures to protect user data, privacy settings help control who can see your information, and being cautious about what you share minimizes the risk of identity theft and fraud.
6.
Which of the following is a sign of a phishing attempt?
Correct Answer
C. An urgent request for information
Explanation
An urgent request for information, especially from supposedly official sources, is a common sign of a phishing attempt. Phishers create a sense of urgency to provoke a quick reaction before the recipient can think critically or verify the legitimacy of the request. This tactic is designed to exploit human emotions and bypass rational thinking, prompting immediate action that could lead to disclosing confidential information.
7.
What is the appropriate step if you encounter a suspicious link online?
Correct Answer
D. Report or block it
Explanation
Encountering a suspicious link should prompt immediate caution. The best practice is to neither click on the link nor share it but to report or block it. This action prevents potential exposure to malware, phishing sites, or scams. Reporting suspicious links helps improve security filters and protects others from falling victim to similar threats.
8.
How should you handle personal data on shared computers?
Correct Answer
D. Always log out and clear data
Explanation
Handling personal data on shared computers by always logging out and clearing data after use is vital to protect your information from subsequent users. Shared computers can easily become sources of data leakage if personal logins and browsing histories are not cleared. This practice ensures that sensitive information such as passwords, financial data, and personal details are not accessible to others who use the same computer.
9.
What behavior contributes to safer internet use?
Correct Answer
B. Frequent password changes
Explanation
Changing passwords frequently is a proactive security measure that helps keep your online accounts secure. Regular updates to your passwords can prevent unauthorized access from those who may have inadvertently discovered them, or from ongoing unauthorized access gained from a previous security breach. This practice, combined with using different passwords for different sites, significantly reduces the risk of being hacked.
10.
What is the most effective way to deal with spam emails?
Correct Answer
C. Block the sender and report as spam
Explanation
Dealing with spam emails effectively involves blocking the sender and marking the emails as spam. This not only removes the immediate nuisance from your inbox but also aids your email provider in adjusting their spam filters to catch similar emails in the future. This proactive approach prevents clutter in your inbox while enhancing your overall email security by reducing the likelihood of interacting with potentially harmful content.