Test Your Security Evaluate Your Cyber Security Cyber threats are constantly evolving — but so can your defenses. This quiz will ask you a series of questions to assess your current cybersecurity knowledge and practices. It’s not a test, but a tool to help you stay safer online.⏱ You’ll have 15 minutes to complete the quiz.Ready? Let’s get started! Please Fill in the Following Details to Start the QuizTo personalize your results and help us better understand your cybersecurity awareness, kindly provide the following: 1 / 30 1. What is a VPN used for? A) Watching movies B) Hiding IP address and encrypting data C) Cleaning viruses D) Speeding up Wi-Fi 2 / 30 2. Which password is the strongest? A) welCome2024! B) iloveyou C) qwerty D) 123456 3 / 30 3. A link has a strange domain (e.g., yourbank-login.ru). What do you do? A) Screenshot it B) Click to test C) Save for later D) Ignore and report 4 / 30 4. What’s an example of a zero-day attack? A) Update failure B) Battery drain C) Known virus D) Exploit in software before the vendor is aware 5 / 30 5. What is phishing? A) None of the above B) A secure login method C) A hacking technique D) An ocean sport 6 / 30 6. What makes this email suspicious? A) It’s from a friend B) It asks for urgent action and has grammar errors C) It’s too long 7 / 30 7. How do hackers use social media? A) To block ads B) To find jobs C) To post selfies D) To gather personal info 8 / 30 8. What’s a safe way to access online banking? A) From public PC B) Through the bank’s official app C) Clicking SMS link D) Using your friend’s phone 9 / 30 9. Which of these is a phishing method used in SMS? A) Spoofing B) Vishing C) Smishing D) Pharming 10 / 30 10. What does this symbol mean? A) Hacker site B) Unsafe site C) Secure connection D) Broken website 11 / 30 11. This QR code leads to a suspicious link. What should you do? A) Try it later B) Scan it C) Ignore it D) Share it 12 / 30 12. Which of the following is a common social engineering trick? A) Posting memes B) Offering a free course C) Asking for help urgently D) Updating your app 13 / 30 13. What’s a good rule for creating passwords? A) Use your birthdate B) Use “password” for easy memory C) Use a mix of letters, numbers, and symbols D) Reuse the same one 14 / 30 14. You receive a friend request from someone you don’t know. What do you do? A) Message them B) Ignore for later C) Report and delete D) Accept 15 / 30 15. What is malware? A) Spam B) Email virus C) Malicious software D) Protective software 16 / 30 16. Which of the following might indicate ransomware? A) Pop-up ads B) Bluetooth issue C) Device runs faster D) Files are encrypted with a payment request 17 / 30 17. How often should you update your software? A) Only when broken B) When prompted C) Once a year D) Never 18 / 30 18. Your device was stolen. What should you do first? A) Post on social media B) Search for it yourself C) Call a friend D) Wipe it remotely 19 / 30 19. What does 2FA stand for? A) Firewall Access B) None of the above C) Two-Factor Authentication D) Two-Face Approval 20 / 30 20. Which is a secure way to store passwords? A) On a sticky note B) In a password manager C) In a notebook D) In your phone’s notepad 21 / 30 21. Which of the following is NOT a safe backup method? A) Offline NAS drive B) External encrypted drive C) Encrypted cloud storage D) USB with no encryption 22 / 30 22. What is multi-layered security called? A) Firewalling B) Zero Access C) Defense in Depth D) Cyberstack 23 / 30 23. Which of these could be a scam? A) Newsletter B) Prize popup C) Online receipt 24 / 30 24. What should you do if your account is hacked? A) Ignore it B) Change password and notify service C) Tell a friend only D) Delete the app 25 / 30 25. Which device is the safest to connect to public Wi-Fi? A) Laptop with VPN B) Gaming console C) Any phone D) Smartwatch 26 / 30 26. What is identity theft? A) Being hacked B) Someone using your social media C) Forgetting your login D) Someone stealing your personal data 27 / 30 27. Which is NOT a secure action? A) Logging out after use B) Clicking unknown links C) Updating apps D) Using antivirus 28 / 30 28. Which of the following is okay to post online? A) Your favorite color B) Your pet’s name C) Your home address D) Your credit card number 29 / 30 29. What is the first thing to do after spotting a data breach? A) Restart device B) Reset passwords C) Uninstall apps D) Delete email 30 / 30 30. Which of these passwords is most secure? A) sarah123 B) CoffeeLover@22 C) mypassword D) 987654321 Your score isThe average score is 27% 0% Restart quiz