Test Your Security Evaluate Your Cyber Security Cyber threats are constantly evolving — but so can your defenses. This quiz will ask you a series of questions to assess your current cybersecurity knowledge and practices. It’s not a test, but a tool to help you stay safer online. ⏱ You’ll have 15 minutes to complete the quiz. Ready? Let’s get started! Please Fill in the Following Details to Start the QuizTo personalize your results and help us better understand your cybersecurity awareness, kindly provide the following: 1 / 30 1. What makes this email suspicious? A) It’s too long B) It asks for urgent action and has grammar errors C) It’s from a friend 2 / 30 2. A link has a strange domain (e.g., yourbank-login.ru). What do you do? A) Ignore and report B) Click to test C) Screenshot it D) Save for later 3 / 30 3. What is malware? A) Email virus B) Protective software C) Malicious software D) Spam 4 / 30 4. Which of these is a phishing method used in SMS? A) Vishing B) Pharming C) Spoofing D) Smishing 5 / 30 5. Which of the following might indicate ransomware? A) Pop-up ads B) Device runs faster C) Bluetooth issue D) Files are encrypted with a payment request 6 / 30 6. What is identity theft? A) Someone stealing your personal data B) Someone using your social media C) Being hacked D) Forgetting your login 7 / 30 7. Which of the following is okay to post online? A) Your favorite color B) Your home address C) Your credit card number D) Your pet’s name 8 / 30 8. Which is NOT a secure action? A) Updating apps B) Clicking unknown links C) Logging out after use D) Using antivirus 9 / 30 9. Which of these passwords is most secure? A) CoffeeLover@22 B) mypassword C) sarah123 D) 987654321 10 / 30 10. What’s a good rule for creating passwords? A) Use your birthdate B) Reuse the same one C) Use “password” for easy memory D) Use a mix of letters, numbers, and symbols 11 / 30 11. Which password is the strongest? A) 123456 B) qwerty C) iloveyou D) welCome2024! 12 / 30 12. Which of these could be a scam? A) Prize popup B) Newsletter C) Online receipt 13 / 30 13. What’s an example of a zero-day attack? A) Update failure B) Battery drain C) Exploit in software before the vendor is aware D) Known virus 14 / 30 14. Your device was stolen. What should you do first? A) Post on social media B) Search for it yourself C) Call a friend D) Wipe it remotely 15 / 30 15. Which of the following is NOT a safe backup method? A) Encrypted cloud storage B) USB with no encryption C) Offline NAS drive D) External encrypted drive 16 / 30 16. Which device is the safest to connect to public Wi-Fi? A) Laptop with VPN B) Smartwatch C) Gaming console D) Any phone 17 / 30 17. How do hackers use social media? A) To block ads B) To post selfies C) To gather personal info D) To find jobs 18 / 30 18. What does this symbol mean? A) Unsafe site B) Secure connection C) Broken website D) Hacker site 19 / 30 19. What is a VPN used for? A) Speeding up Wi-Fi B) Cleaning viruses C) Watching movies D) Hiding IP address and encrypting data 20 / 30 20. This QR code leads to a suspicious link. What should you do? A) Scan it B) Ignore it C) Try it later D) Share it 21 / 30 21. How often should you update your software? A) Once a year B) When prompted C) Never D) Only when broken 22 / 30 22. What should you do if your account is hacked? A) Tell a friend only B) Ignore it C) Change password and notify service D) Delete the app 23 / 30 23. You receive a friend request from someone you don’t know. What do you do? A) Accept B) Message them C) Report and delete D) Ignore for later 24 / 30 24. What is the first thing to do after spotting a data breach? A) Uninstall apps B) Reset passwords C) Delete email D) Restart device 25 / 30 25. What’s a safe way to access online banking? A) Using your friend’s phone B) Through the bank’s official app C) Clicking SMS link D) From public PC 26 / 30 26. Which of the following is a common social engineering trick? A) Updating your app B) Offering a free course C) Posting memes D) Asking for help urgently 27 / 30 27. What is phishing? A) A hacking technique B) None of the above C) An ocean sport D) A secure login method 28 / 30 28. What is multi-layered security called? A) Zero Access B) Firewalling C) Defense in Depth D) Cyberstack 29 / 30 29. What does 2FA stand for? A) Firewall Access B) None of the above C) Two-Factor Authentication D) Two-Face Approval 30 / 30 30. Which is a secure way to store passwords? A) In your phone’s notepad B) In a password manager C) In a notebook D) On a sticky note Your score isThe average score is 32% 0% Restart quiz