#1
Which of the following is a common method used by cybercriminals to trick people into revealing sensitive information?
Phishing
ExplanationFraudulent attempt by disguising as trustworthy to obtain sensitive data.
#2
What does VPN stand for in the context of online safety?
Virtual Private Network
ExplanationSecure connection for online privacy and anonymity.
#3
What information should you avoid sharing publicly on social media platforms to protect your privacy?
Your home address
ExplanationSensitive personal data requiring protection from public exposure.
#4
What is a common method used by parents to monitor and manage their children's online activities?
Parental control software
ExplanationSoftware regulating and supervising kids' online interactions.
#5
What does HTTPS stand for in the context of web browsing?
Hypertext Transfer Protocol Secure
ExplanationEncrypted communication protocol for secure web browsing.
#6
What is the main purpose of a firewall in online security?
To filter incoming and outgoing network traffic
ExplanationRegulates network data flow for security.
#7
What is a common method to secure your online accounts with an extra layer of protection?
Using multi-factor authentication
ExplanationEnhances security with multiple verification steps.
#8
What is the term used to describe the practice of creating multiple fake online identities to deceive others?
Catfishing
ExplanationDeception using fabricated online personas.
#9
Which of the following is NOT considered a strong password practice?
Using easily guessable information like birthdates
ExplanationWeak password choice facilitating easy unauthorized access.
#10
What is the term used to describe the unauthorized access or use of an individual's personal or financial information for the purpose of committing fraud?
Identity theft
ExplanationIllegal acquisition and exploitation of personal or financial data.
#11
What is a software vulnerability often exploited by cyber attackers, which the software vendor may release a patch to fix?
Zero-day vulnerability
ExplanationUnpatched flaw exploited before vendor's knowledge.