#1
What should you do if you receive a suspicious email asking for personal information?
Reply with the requested information
Ignore the email
Provide the information as requested
Report it as phishing and delete it
#2
What is a common practice to secure your online accounts?
Using the same password for all accounts
Sharing passwords with friends
Using strong, unique passwords for each account
Writing passwords on sticky notes
#3
What does the 'https://' at the beginning of a URL indicate?
The website is highly secure
The website is a government site
Data exchanged with the website is encrypted
The website is fake
#4
Which of the following is NOT a recommended measure for securing your home network?
Using a strong, unique Wi-Fi password
Disabling firewall protections
Enabling network encryption
Updating router firmware regularly
#5
What does the acronym 'CPR' stand for in the context of first aid?
Cardio Pulmonary Resuscitation
Critical Personal Response
Comprehensive Pain Relief
Crisis Prevention and Response
#6
What is the first thing you should do in case of a fire emergency?
Evacuate immediately
Call emergency services
Attempt to put out the fire yourself
Inform your supervisor
#7
Which of the following is a good habit to maintain personal safety when walking alone at night?
Wearing headphones to listen to music
Keeping keys between your fingers
Walking close to isolated areas
Avoiding eye contact with others
#8
In a disaster preparedness plan, what does the term 'bug out bag' refer to?
A bag of insect repellent
A bag of essential items for surviving for a short period away from home
A bag of snacks and drinks
A bag of medical supplies
#9
What is the purpose of two-factor authentication (2FA) in enhancing security?
It requires two different passwords
It verifies identity using two different methods
It encrypts data twice
It blocks access from two different IP addresses
#10
What is the purpose of a fire extinguisher's PASS technique?
Preventing All Spreading Situations
Pull, Aim, Squeeze, Sweep
Protect Against Smoke and Soot
Provide Adequate Suppression Support
#11
What is social engineering in the context of personal security?
A type of martial art
A method used by hackers to manipulate individuals into divulging confidential information
A psychological therapy technique
A strategy to improve social skills
#12
What is the best course of action if you suspect that someone is following you?
Ignore them and continue walking
Confront them directly
Change your route and seek help from a trusted person or authority
Pretend to be on the phone
#13
In the context of online transactions, what is 'phishing'?
A type of fishing technique
A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity
A computer virus
A secure method of online communication
#14
What is the 'man-in-the-middle' attack in the context of cybersecurity?
A physical altercation during a security breach
A type of encryption method
An attack where the attacker intercepts and alters communication between two parties
A term used in network gaming
#15
What is the purpose of setting up a trusted contact for personal safety?
To share sensitive information
To have someone to vouch for you
To provide assistance or help in emergency situations
To increase social media followers