Test Your Security Evaluate Your Cyber Security Cyber threats are constantly evolving — but so can your defenses. This quiz will ask you a series of questions to assess your current cybersecurity knowledge and practices. It’s not a test, but a tool to help you stay safer online.⏱ You’ll have 15 minutes to complete the quiz.Ready? Let’s get started! Please Fill in the Following Details to Start the QuizTo personalize your results and help us better understand your cybersecurity awareness, kindly provide the following: 1 / 30 1. How often should you update your software? A) Only when broken B) When prompted C) Never D) Once a year 2 / 30 2. This QR code leads to a suspicious link. What should you do? A) Scan it B) Try it later C) Ignore it D) Share it 3 / 30 3. What is the first thing to do after spotting a data breach? A) Delete email B) Reset passwords C) Uninstall apps D) Restart device 4 / 30 4. How do hackers use social media? A) To gather personal info B) To block ads C) To post selfies D) To find jobs 5 / 30 5. What is phishing? A) A secure login method B) A hacking technique C) None of the above D) An ocean sport 6 / 30 6. A link has a strange domain (e.g., yourbank-login.ru). What do you do? A) Click to test B) Ignore and report C) Save for later D) Screenshot it 7 / 30 7. Your device was stolen. What should you do first? A) Wipe it remotely B) Search for it yourself C) Post on social media D) Call a friend 8 / 30 8. What makes this email suspicious? A) It’s too long B) It asks for urgent action and has grammar errors C) It’s from a friend 9 / 30 9. Which password is the strongest? A) welCome2024! B) 123456 C) qwerty D) iloveyou 10 / 30 10. Which of these passwords is most secure? A) mypassword B) sarah123 C) CoffeeLover@22 D) 987654321 11 / 30 11. What should you do if your account is hacked? A) Tell a friend only B) Ignore it C) Delete the app D) Change password and notify service 12 / 30 12. Which of the following is a common social engineering trick? A) Updating your app B) Posting memes C) Asking for help urgently D) Offering a free course 13 / 30 13. Which of these is a phishing method used in SMS? A) Spoofing B) Pharming C) Vishing D) Smishing 14 / 30 14. Which is NOT a secure action? A) Using antivirus B) Logging out after use C) Updating apps D) Clicking unknown links 15 / 30 15. Which of the following is okay to post online? A) Your favorite color B) Your pet’s name C) Your home address D) Your credit card number 16 / 30 16. What’s a safe way to access online banking? A) From public PC B) Using your friend’s phone C) Clicking SMS link D) Through the bank’s official app 17 / 30 17. Which of the following might indicate ransomware? A) Files are encrypted with a payment request B) Bluetooth issue C) Device runs faster D) Pop-up ads 18 / 30 18. You receive a friend request from someone you don’t know. What do you do? A) Ignore for later B) Message them C) Accept D) Report and delete 19 / 30 19. What’s an example of a zero-day attack? A) Exploit in software before the vendor is aware B) Known virus C) Update failure D) Battery drain 20 / 30 20. What does this symbol mean? A) Unsafe site B) Secure connection C) Hacker site D) Broken website 21 / 30 21. What is identity theft? A) Someone stealing your personal data B) Someone using your social media C) Being hacked D) Forgetting your login 22 / 30 22. Which device is the safest to connect to public Wi-Fi? A) Any phone B) Gaming console C) Laptop with VPN D) Smartwatch 23 / 30 23. What is multi-layered security called? A) Firewalling B) Cyberstack C) Defense in Depth D) Zero Access 24 / 30 24. Which is a secure way to store passwords? A) On a sticky note B) In a notebook C) In a password manager D) In your phone’s notepad 25 / 30 25. What’s a good rule for creating passwords? A) Use a mix of letters, numbers, and symbols B) Use your birthdate C) Use “password” for easy memory D) Reuse the same one 26 / 30 26. What does 2FA stand for? A) None of the above B) Two-Face Approval C) Firewall Access D) Two-Factor Authentication 27 / 30 27. What is a VPN used for? A) Hiding IP address and encrypting data B) Speeding up Wi-Fi C) Watching movies D) Cleaning viruses 28 / 30 28. Which of the following is NOT a safe backup method? A) USB with no encryption B) External encrypted drive C) Encrypted cloud storage D) Offline NAS drive 29 / 30 29. Which of these could be a scam? A) Newsletter B) Prize popup C) Online receipt 30 / 30 30. What is malware? A) Spam B) Email virus C) Protective software D) Malicious software Your score isThe average score is 27% 0% Restart quiz