1) Which of the following is considered sensitive personal information that should not be shared online? a) Favorite color b) Name c) current weather d) Last movie watched 2) Why is it important not to share your mother’s maiden name online? a) It can be used for identity theft. b) It is a sign of respect to your mother. c) It is not important d) It reveals your mother's occupation 3) What is a common use of a "birthday" by hackers? a) To guess security questions b) To send birthday gifts c) To calculate tax d) To track job performance 4) Which of the following is the safest to share online? a) Pet’s name b) Hometown c) Your favorite type of food d) Mother’s maiden name 5) Why should you avoid using your pet’s name in passwords? a) It is difficult to remember. b) It is too long c) It can be easily guessed by someone who knows you d) Pets don't like it. 6) Which of these practices can help keep your personal information safe online? a) Sharing your hometown on social media b) Using strong and unique passwords c) Posting your birthday publicly d) Using your pet’s name as a password 7) What is the primary risk of sharing personal information like your mother’s maiden name online? a) People might send you gifts. b) It can be used for password recovery by hackers. c) It will lead to spam emails. d) It might get mispronounced. 8) Which of the following is a good practice when setting up security questions for an account? a) Using information that is easily found online, like your pet’s name b) Making up answers that only you would know c) Using your birth year as the answer d) Reusing answers across multiple accounts 9) What is a common tactic used by hackers to gather personal information? a) Phishing emails b) • Writing online reviews c) • Joining social media groups d) • Buying products online 10) Which of the following is NOT considered sensitive information? a) Social Security Number b) Your full name c) Your favorite movie d) Credit card information 11) What should you do if a website asks for your hometown as part of account recovery? a) Enter your real hometown. b) Use a fake hometown or random answer. c) Skip the question. d) Share your hometown on social media to prove it's correct. 12) What could happen if someone has access to both your birthday and mother’s maiden name? a) They can celebrate your birthday with you. b) They can access sensitive accounts using that information. c) They can steal your car. d) They can apply for jobs in your name. 13) How can you protect your online accounts from being compromised? a) Use your pet’s name in all passwords. b) Use the same password for all accounts. c) Use two-factor authentication. d) Share your passwords with friends for safekeeping. 14) Why should you avoid sharing your hometown on social media profiles? a) It reveals too much personal information. b) It shows where you currently live. c) •It’s not important information. d) It can make your profile look cluttered. 15) What is one of the most secure ways to create a password? a) Using your pet’s name and birth year b) Using a mix of upper and lower-case letters, numbers, and symbols c) Using your hometown as the password d) Using your favorite color and pet’s name combined 16) What is a common method hackers use to steal personal information? a) Friendly emails b) Social engineering c) Playing video games d) Watching movies 17) Which of these is an example of social engineering? a) A fake email asking for your password b) A secure website requesting a password update c) A social media post about a new movie d) A legitimate job offer 18) What is a good security practice regarding your online presence? a) Posting your birthday to get more birthday messages b) Regularly updating privacy settings on social media c) • C) Sharing your pet’s name and picture for fun d) Using the same security questions for all accounts 19) What should you do if you suspect your personal information has been exposed? a) Ignore it and hope nothing happens. b) Change passwords and monitor your accounts for unusual activity. c) Tell your friends but take no action. d) Post about it on social media. 20) Which of these is NOT a good source for choosing a password? a) Randomly generated passwords b) A password manager c) Your pet’s name d) A combination of unrelated words

PRINCIPLES OF CYBERSECURITY

Leaderboard

Visual style

Options

Switch template

Continue editing: ?