1) What is cybersecurity? a) Protecting personal information from being lost b) Protecting computers, networks, and data from unauthorized access c) Using computers to solve math problems d) Protecting physical objects like computers from being stolen 2) What is cybersecurity?Which of the following is a strong password? a) 123456 b) password c) MyD0g$!sAw3some d) abcdef 3) What is phishing? a) Sending harmful software to a computer b) Pretending to be someone else to steal personal information c) Catching fish on the internet d) Using strong passwords 4) What should you do if you receive an email from someone you don't know, asking for your personal information? a) Reply with your information b) Click on any links in the email c) Delete the email or report it d) Share the email with your friends 5) Which of these is NOT a form of malware? a) virus b) worm c) firewall d) trojan horse 6) What is a firewall? a) A type of malware b) A security system that blocks unauthorized access to a network c) A type of virus that damages files d) A tool used to clean a computer 7) What does "encryption" mean? a) Changing information into a secret code to protect it b) Deleting files so they can't be found c) Writing computer programs d) Scanning for viruses on a computer 8) What is two-factor authentication? a) Using two different passwords b) Using both a password and another method, like a code sent to your phone c) Logging into two accounts at the same time d) Asking two people for help logging in 9) What is the purpose of antivirus software? a) To infect your computer with a virus b) To protect your computer from malware and viruses c) To speed up your internet d) To delete all files on your computer 10) Which of the following is the safest way to access a website? a) Clicking a link from an email b) Typing the website URL directly into the browser c) Clicking the first link in a search engine d) Using a link from a random ad 11) What does it mean when a website uses "https" instead of "http"? a) The website is slower b) The website is encrypted and more secure c) The website is unsafe d) The website is not working 12) What should you do if someone is cyberbullying you? a) Keep it a secret b) Respond with mean comments c) Report it to a trusted adult or authority d) Ignore it and hope it goes away 13) Which of these is a good example of digital etiquette (netiquette)? a) Sharing someone's personal information without their permission b) Being respectful and polite in online conversations c) Sending mean messages to people you don't like d) Posting everything you do online without thinking 14) Which of the following is NOT a sign of a phishing website or email? a) The email asks for personal information b) There are lots of spelling mistakes c) The email is from someone you know and trust d) The website asks for your password without a secure connection (no "https") 15) What is social engineering? a) Building websites and apps b) Tricking people into giving up their personal information c) Protecting your identity online d) Creating strong passwords 16) What should you do if your computer is acting strangely and you think it might have a virus? a) Ignore it and hope it gets better b) Download more programs to fix it c) Run your antivirus software and scan for malware d) Keep using it as usual 17) Which of the following is a good way to protect your online accounts? a) Use the same password for all accounts b) Share your password with friends c) Use strong passwords that are hard to guess d) Write your password on a sticky note near your computer 18) What is the most secure way to connect to a public Wi-Fi network? a) Use a VPN (Virtual Private Network) b) Connect without any security c) Enter your personal information when prompted d) Only use it for social media 19) Why is it important to keep your software and apps up to date? a) To get new features b) To prevent the apps from crashing c) To fix security holes and vulnerabilities d) To change the look of the software 20) What is a data breach? a) When someone deletes your data b) When a company accidentally loses your data c) When unauthorized people access and steal personal or sensitive information d) When your internet stops working

Cybersecurity Pre-test

Leaderboard

Visual style

Options

Switch template

Continue editing: ?