#1
What should you do if you receive a suspicious email asking for personal information?
Report it as phishing and delete it
ExplanationPrevent phishing attacks by reporting suspicious emails and avoiding disclosing personal information.
#2
What is a common practice to secure your online accounts?
Using strong, unique passwords for each account
ExplanationEnhance online security by using distinct, robust passwords for every account.
#3
What does the 'https://' at the beginning of a URL indicate?
Data exchanged with the website is encrypted
ExplanationThe 'https://' prefix indicates that data exchanged with the website is encrypted, enhancing security.
#4
Which of the following is NOT a recommended measure for securing your home network?
Disabling firewall protections
ExplanationAvoid compromising home network security by not disabling firewall protections, which safeguard against unauthorized access.
#5
What does the acronym 'CPR' stand for in the context of first aid?
Cardio Pulmonary Resuscitation
ExplanationCPR stands for Cardio Pulmonary Resuscitation, a critical first aid procedure for reviving individuals experiencing cardiac arrest or respiratory failure.
#6
What is the first thing you should do in case of a fire emergency?
Evacuate immediately
ExplanationPrioritize safety during fire emergencies by evacuating immediately.
#7
Which of the following is a good habit to maintain personal safety when walking alone at night?
Keeping keys between your fingers
ExplanationEnhance personal safety while walking alone at night by keeping keys positioned between your fingers for self-defense.
#8
In a disaster preparedness plan, what does the term 'bug out bag' refer to?
A bag of essential items for surviving for a short period away from home
ExplanationA 'bug out bag' contains essential items for short-term survival away from home, essential in disaster preparedness plans.
#9
What is the purpose of two-factor authentication (2FA) in enhancing security?
It verifies identity using two different methods
ExplanationTwo-factor authentication enhances security by verifying identity through two distinct methods, providing an additional layer of protection.
#10
What is the purpose of a fire extinguisher's PASS technique?
Pull, Aim, Squeeze, Sweep
ExplanationThe PASS technique (Pull, Aim, Squeeze, Sweep) is used to operate a fire extinguisher effectively in emergency situations, facilitating prompt and efficient fire suppression.
#11
What is social engineering in the context of personal security?
A method used by hackers to manipulate individuals into divulging confidential information
ExplanationSocial engineering involves hackers manipulating individuals to disclose sensitive information, posing a significant security risk.
#12
What is the best course of action if you suspect that someone is following you?
Change your route and seek help from a trusted person or authority
ExplanationIf suspicious of being followed, change your route and seek assistance from a trusted individual or authority to ensure personal safety.
#13
In the context of online transactions, what is 'phishing'?
A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity
ExplanationPhishing involves fraudulent attempts to obtain sensitive information by impersonating legitimate entities, posing significant risks to online transactions and security.
#14
What is the 'man-in-the-middle' attack in the context of cybersecurity?
An attack where the attacker intercepts and alters communication between two parties
ExplanationA 'man-in-the-middle' attack involves an attacker intercepting and altering communication between two parties, compromising data integrity and security.
#15
What is the purpose of setting up a trusted contact for personal safety?
To provide assistance or help in emergency situations
ExplanationSetting up a trusted contact enhances personal safety by providing assistance or help during emergency situations, ensuring timely support and response.