#1
Which of the following can be considered as personal information?
All of the above
ExplanationVarious types of personal information are considered private.
#2
Which document is commonly used for identity verification?
Passport
ExplanationPassport is a widely accepted form of identification.
#3
Which of the following passwords is considered the strongest?
Y6%k2#9!pQ
ExplanationComplex passwords like this offer high security.
#4
Which of the following is a secure way to dispose of documents containing personal information?
Shredding them before disposal
ExplanationShredding prevents unauthorized access to personal information.
#5
Which of the following is NOT a common method of verifying a user's identity online?
Physical mail verification
ExplanationPhysical mail verification is not commonly used online.
#6
Which action can help protect your email account from unauthorized access?
Enabling two-factor authentication
ExplanationTwo-factor authentication adds an extra layer of security to email accounts.
#7
What piece of personal information is crucial for completing financial transactions online?
Your credit card number
ExplanationCredit card number is essential for online financial transactions.
#8
Which of the following is considered sensitive personal information that should be kept secure?
Your mother's maiden name
ExplanationMother's maiden name is sensitive and should be protected.
#9
What method is commonly used to protect your data privacy online?
Two-factor authentication
ExplanationTwo-factor authentication enhances online security.
#10
What should you do if you receive an email asking for your personal details from a suspicious source?
Report the email as phishing
ExplanationReporting suspicious emails helps prevent phishing attacks.
#11
What does GDPR stand for in the context of data protection and privacy?
General Data Protection Regulation
ExplanationGDPR is a set of regulations for protecting personal data.
#12
Which of the following is a recommended practice for maintaining online privacy?
Regularly updating your privacy settings on social media
ExplanationRegular updates ensure control over personal information.
#13
In the context of data protection, what does the acronym 'PII' stand for?
Personally Identifiable Information
ExplanationPII refers to information that can identify an individual.
#14
In the context of online privacy, what is 'encryption' used for?
To protect data from unauthorized access
ExplanationEncryption ensures data security by restricting access.
#15
What type of attack involves a hacker trying different password combinations to gain unauthorized access to an account?
Brute force attack
ExplanationBrute force attack relies on trying numerous password combinations.
#16
What is the purpose of anonymizing data?
To protect individuals' privacy by removing personally identifiable information
ExplanationAnonymizing data ensures privacy by removing identifying details.