Test Your Security Evaluate Your Cyber Security Cyber threats are constantly evolving — but so can your defenses. This quiz will ask you a series of questions to assess your current cybersecurity knowledge and practices. It’s not a test, but a tool to help you stay safer online.⏱ You’ll have 15 minutes to complete the quiz.Ready? Let’s get started! Please Fill in the Following Details to Start the QuizTo personalize your results and help us better understand your cybersecurity awareness, kindly provide the following: 1 / 30 1. Your device was stolen. What should you do first? A) Search for it yourself B) Wipe it remotely C) Post on social media D) Call a friend 2 / 30 2. Which of these is a phishing method used in SMS? A) Smishing B) Pharming C) Vishing D) Spoofing 3 / 30 3. What is identity theft? A) Someone using your social media B) Being hacked C) Someone stealing your personal data D) Forgetting your login 4 / 30 4. Which of the following is okay to post online? A) Your favorite color B) Your credit card number C) Your home address D) Your pet’s name 5 / 30 5. Which is a secure way to store passwords? A) In a password manager B) On a sticky note C) In a notebook D) In your phone’s notepad 6 / 30 6. What is multi-layered security called? A) Firewalling B) Defense in Depth C) Zero Access D) Cyberstack 7 / 30 7. Which is NOT a secure action? A) Updating apps B) Logging out after use C) Using antivirus D) Clicking unknown links 8 / 30 8. Which of the following is NOT a safe backup method? A) External encrypted drive B) USB with no encryption C) Offline NAS drive D) Encrypted cloud storage 9 / 30 9. This QR code leads to a suspicious link. What should you do? A) Scan it B) Try it later C) Ignore it D) Share it 10 / 30 10. What does this symbol mean? A) Broken website B) Unsafe site C) Hacker site D) Secure connection 11 / 30 11. Which of the following is a common social engineering trick? A) Posting memes B) Offering a free course C) Updating your app D) Asking for help urgently 12 / 30 12. What does 2FA stand for? A) Firewall Access B) None of the above C) Two-Factor Authentication D) Two-Face Approval 13 / 30 13. A link has a strange domain (e.g., yourbank-login.ru). What do you do? A) Save for later B) Click to test C) Screenshot it D) Ignore and report 14 / 30 14. What is the first thing to do after spotting a data breach? A) Uninstall apps B) Restart device C) Delete email D) Reset passwords 15 / 30 15. Which device is the safest to connect to public Wi-Fi? A) Smartwatch B) Laptop with VPN C) Gaming console D) Any phone 16 / 30 16. What makes this email suspicious? A) It’s too long B) It asks for urgent action and has grammar errors C) It’s from a friend 17 / 30 17. You receive a friend request from someone you don’t know. What do you do? A) Message them B) Ignore for later C) Report and delete D) Accept 18 / 30 18. What should you do if your account is hacked? A) Ignore it B) Delete the app C) Change password and notify service D) Tell a friend only 19 / 30 19. What’s a safe way to access online banking? A) Using your friend’s phone B) Through the bank’s official app C) Clicking SMS link D) From public PC 20 / 30 20. What is phishing? A) A secure login method B) A hacking technique C) An ocean sport D) None of the above 21 / 30 21. What is a VPN used for? A) Speeding up Wi-Fi B) Cleaning viruses C) Watching movies D) Hiding IP address and encrypting data 22 / 30 22. How often should you update your software? A) When prompted B) Only when broken C) Once a year D) Never 23 / 30 23. How do hackers use social media? A) To post selfies B) To gather personal info C) To block ads D) To find jobs 24 / 30 24. Which of these could be a scam? A) Online receipt B) Prize popup C) Newsletter 25 / 30 25. Which password is the strongest? A) 123456 B) iloveyou C) qwerty D) welCome2024! 26 / 30 26. Which of these passwords is most secure? A) mypassword B) 987654321 C) CoffeeLover@22 D) sarah123 27 / 30 27. What is malware? A) Email virus B) Spam C) Malicious software D) Protective software 28 / 30 28. Which of the following might indicate ransomware? A) Pop-up ads B) Files are encrypted with a payment request C) Bluetooth issue D) Device runs faster 29 / 30 29. What’s an example of a zero-day attack? A) Known virus B) Exploit in software before the vendor is aware C) Battery drain D) Update failure 30 / 30 30. What’s a good rule for creating passwords? A) Use your birthdate B) Use “password” for easy memory C) Reuse the same one D) Use a mix of letters, numbers, and symbols Your score isThe average score is 32% 0% Restart quiz