1) What is a hacker? a) A person who has computer or network skills and uses them to overcome system or network security. b) A person who is interested in exploring and learning about computer systems and networks. c) A person who specializes in computer and network security, hired to protect systems from cyber attacks. d) A person who uses his or her skills to harm others, such as stealing personal information or destroying data. 2) Why are hackers dangerous? a) They are people who specialize in protecting computer systems from cyber attacks b) They are people who are curious and like to explore computer systems c) They can steal personal information or destroy data d) They are people who work for governments or business organizations 3) What is Internet Security? a) Protect your computer from viruses or malware b) Protect users from online fraud c) Protect the network system from attacks d) Protect information and systems from unauthorized access, use, disclosure, alteration or destruction when using the internet 4) What is the goal of Internet Security? a) Protect the integrity, availability and confidentiality of information b) Protect user privacy c) Protect the network system from threats d) All of the above answers 5) What do internet security elements include? a) Strong password b) Firewall c) Anti-virus software d) All of the above answers 6) What is a firewall? a) A software or hardware system that controls network traffic b) A software or hardware system that prevents all unauthorized access c) A software or hardware system that encrypts all network traffic d) A software or hardware system that manages access rights for users 7) What is encryption? a) The process of converting data into an easily formatted readable form b) The process of converting data into a format that only authorized users can read c) The process of converting data into a format that is uniquely readable by someone new to decrypting the key d) The process of converting data into an unreadable format 8) What are the most internet security threats? a) Malware b) Phishing c) Ransomware d) Public Wifi e) All of the above answers 9) Which of the following types of cyberattacks typically uses spoofed emails to trick users into clicking on malicious links? a) Denial of service attack b) Phishing attacks c) Intrusion attack d) Public Wifi 10) How to protect data online? a) Password Power b) Secure Your Devices c) Be Wary of Phishing d) Practice Safe Browsing e) Secure Your Wi-Fi f) All of the above answers 11) A strong password needs to meet which of the following criteria? a) Must be at least 8 characters long b) Includes letters, numbers and special characters c) Should not contain personal information d) All three answers above 12) How to keep safe online? a) Sharing your personal information with strangers. b) Use strong and unique passwords for all your accounts. c) Downloading files or applications from untrusted sources. d) Not updating your security software.

Leaderboard

Visual style

Options

Switch template

Continue editing: ?