1) What is cybersecurity? a) Protecting animals b) Protecting computers and networks from harm c) Learning how to code d) Repairing broken computers 2) What does the "C" in the CIA Triad stand for? a) Computers b) Confidentiality c) Communication d) Connections 3) Which of these is a goal of cybersecurity? a) Breaking into computers b) Keeping data safe and secure c) Turning off the internet d) Making computers run slower 4) What is a "password"? a) A way to get into a website or device b) A type of game c) A computer virus d) A type of file 5) Why should you use a strong password? a) To make it easy for others to guess b) To keep your information safe c) To confuse the computer d) To slow down your internet 6) What does a hacker do? a) Repairs computers b) Writes stories c) Tries to break into computers and networks d) Cleans computer screens 7) Which of these is NOT a good password? a) MyCat123 b) 123456 c) ChocolateCake!9 d) $unshine2021 8) What should you do if you receive a strange email from someone you don’t know? a) Open it immediately b) Delete it or mark it as spam c) Reply with personal information d) Share it with friends 9) What is phishing? a) Sending fake emails to trick people b) A type of food c) Fixing computer bugs d) Sending messages to friends 10) Why is it important to lock your computer? a) So it doesn’t get too hot b) B) To keep your information private c) C) To turn off the internet d) D) To save battery 11) What should you do before entering your password in a public place? a) Make sure no one is watching you b) Say your password out loud c) Ask someone to enter it for you d) Change it to something simple 12) What is malware? a) A type of software that can harm your computer b) A new video game c) A social media platform d) A way to speed up your computer 13) Which of these is a safe practice online? a) Sharing your password with friends b) Using different passwords for each account c) Posting your address online d) Downloading any app you find 14) What is encryption? a) Turning information into a secret code b) B) Writing a computer program c) C) A type of computer virus d) D) A way to delete data 15) What should you do if someone asks for your personal information online? a) Give it to them b) B) Ask them why c) C) Ignore them and don’t share personal information d) D) Post it on social media 16) What is a firewall? a) A wall around your house b) A tool that helps protect your computer from attacks c) A password manager d) A type of malware 17) Which of these should you never share online? a) Your favorite color b) Your name c) Your Social Security Number d) Your favorite book 18) What is a "virus" in cybersecurity? a) A type of bug on a plant b) A program that can harm your computer c) A game you play on the internet d) A type of file 19) What does a "keylogger" do? a) Types for you b) Keeps track of the keys you press to steal information c) Locks your computer d) Repairs your computer 20) Which of these is a strong password? a) password b) 12345 c) MyDog!#2022 d) ilovecats 21) What is "shoulder surfing"? a) Watching someone type to steal information b) Surfing on a beach c) Watching videos online d) Playing video games 22) Why is it important to keep software up-to-date? a) To make your computer faster b) To have the latest features and stay protected c) To change the color of the screen d) To delete old files 23) What should you do with a suspicious link in an email? a) Click it to see what it is b) Share it with friends c) Avoid clicking it and delete the email d) Reply to the email 24) What is a "botnet"? a) A game network b) A group of computers controlled by an attacker c) A type of firewall d) A way to speed up your internet 25) What does "two-factor authentication" add to your accounts? a) Extra protection by requiring an extra step to log in b) A way to speed up login c) A backup of your password d) A password reset option 26) Which of these is a safe online habit? a) Sharing your location b) Using weak passwords c) Not clicking on suspicious links d) Using the same password everywhere 27) What should you do if you think your computer has malware? a) Ignore it b) Turn off your computer forever c) Run an antivirus scan and remove it d) Share it with friends 28) Why is it important to have backups of your files? a) To lose them faster b) To save space c) In case something happens to your computer d) To help your computer run faster 29) What is "social engineering" in cybersecurity? a) Fixing social media accounts b) Tricking people into giving away information c) Creating a secure network d) Installing an antivirus program 30) What is a "Trojan horse" in cybersecurity? a) A real horse used in cyber attacks b) A program that looks safe but is actually harmful c) A type of firewall d) A type of computer hardware

Airplane: Intro to Cybersecurity

Leaderboard

Visual style

Options

Switch template

Continue editing: ?