Test Your Security Evaluate Your Cyber Security Cyber threats are constantly evolving — but so can your defenses. This quiz will ask you a series of questions to assess your current cybersecurity knowledge and practices. It’s not a test, but a tool to help you stay safer online.⏱ You’ll have 10 minutes to complete the quiz.Ready? Let’s get started! Please Fill in the Following Details to Start the QuizTo personalize your results and help us better understand your cybersecurity awareness, kindly provide the following: 1 / 30 1. Which of the following is okay to post online? A) Your pet’s name B) Your credit card number C) Your home address D) Your favorite color 2 / 30 2. What is multi-layered security called? A) Firewalling B) Defense in Depth C) Cyberstack D) Zero Access 3 / 30 3. What does this symbol mean? A) Hacker site B) Broken website C) Secure connection D) Unsafe site 4 / 30 4. How do hackers use social media? A) To block ads B) To gather personal info C) To post selfies D) To find jobs 5 / 30 5. Which of the following is a common social engineering trick? A) Offering a free course B) Updating your app C) Asking for help urgently D) Posting memes 6 / 30 6. A link has a strange domain (e.g., yourbank-login.ru). What do you do? A) Click to test B) Ignore and report C) Save for later D) Screenshot it 7 / 30 7. Your device was stolen. What should you do first? A) Search for it yourself B) Post on social media C) Wipe it remotely D) Call a friend 8 / 30 8. What’s an example of a zero-day attack? A) Update failure B) Battery drain C) Exploit in software before the vendor is aware D) Known virus 9 / 30 9. Which device is the safest to connect to public Wi-Fi? A) Gaming console B) Smartwatch C) Any phone D) Laptop with VPN 10 / 30 10. What makes this email suspicious? A) It’s from a friend B) It asks for urgent action and has grammar errors C) It’s too long 11 / 30 11. This QR code leads to a suspicious link. What should you do? A) Scan it B) Share it C) Ignore it D) Try it later 12 / 30 12. Which of the following is NOT a safe backup method? A) Offline NAS drive B) Encrypted cloud storage C) USB with no encryption D) External encrypted drive 13 / 30 13. What is identity theft? A) Someone stealing your personal data B) Forgetting your login C) Someone using your social media D) Being hacked 14 / 30 14. How often should you update your software? A) Once a year B) Only when broken C) Never D) When prompted 15 / 30 15. What does 2FA stand for? A) Two-Factor Authentication B) None of the above C) Firewall Access D) Two-Face Approval 16 / 30 16. Which of these could be a scam? A) Newsletter B) Prize popup C) Online receipt 17 / 30 17. What’s a good rule for creating passwords? A) Use your birthdate B) Use a mix of letters, numbers, and symbols C) Reuse the same one D) Use “password” for easy memory 18 / 30 18. You receive a friend request from someone you don’t know. What do you do? A) Message them B) Ignore for later C) Report and delete D) Accept 19 / 30 19. Which is NOT a secure action? A) Logging out after use B) Updating apps C) Clicking unknown links D) Using antivirus 20 / 30 20. What should you do if your account is hacked? A) Change password and notify service B) Delete the app C) Ignore it D) Tell a friend only 21 / 30 21. What’s a safe way to access online banking? A) Clicking SMS link B) Using your friend’s phone C) From public PC D) Through the bank’s official app 22 / 30 22. Which is a secure way to store passwords? A) On a sticky note B) In a password manager C) In your phone’s notepad D) In a notebook 23 / 30 23. Which of these passwords is most secure? A) CoffeeLover@22 B) mypassword C) Protech123 D) 987654321 24 / 30 24. What is phishing? A) A hacking technique B) None of the above C) A secure login method D) An ocean sport 25 / 30 25. What is malware? A) Email virus B) Spam C) Protective software D) Malicious software 26 / 30 26. Which of these is a phishing method used in SMS? A) Spoofing B) Pharming C) Vishing D) Smishing 27 / 30 27. Which password is the strongest? A) qwerty B) 123456 C) iloveyou D) ProTech2024! 28 / 30 28. What is the first thing to do after spotting a data breach? A) Delete email B) Uninstall apps C) Reset passwords D) Restart device 29 / 30 29. What is a VPN used for? A) Speeding up Wi-Fi B) Cleaning viruses C) Watching movies D) Hiding IP address and encrypting data 30 / 30 30. Which of the following might indicate ransomware? A) Bluetooth issue B) Pop-up ads C) Files are encrypted with a payment request D) Device runs faster Your score isThe average score is 44% 0% Restart quiz