Here are 50 multiple-choice questions (MCQs) on the basics of safe internet practices, including cybersecurity and online privacy, along with their answers and explanations:
1. What is the term for a malicious software program that can spread from one computer to another without the user's knowledge or consent?
- Spyware
- Phishing
- Virus
- Firewall
A virus is a malicious program that can spread without the user's consent.
2. What should you do to create strong, unique passwords for your online accounts?
- Use the same password for all accounts
- Use simple and easily guessable passwords
- Use a combination of letters, numbers, and symbols
- Share your passwords with trusted friends
Using a combination of letters, numbers, and symbols creates strong passwords.
3. Which of the following is NOT a recommended practice for online safety?
- Keeping software and antivirus programs up to date
- Clicking on links in suspicious emails
- Using two-factor authentication (2FA)
- Being cautious about sharing personal information online
Clicking on links in suspicious emails is not a recommended practice; it can lead to phishing attacks.
4. What is the purpose of a VPN (Virtual Private Network) when browsing the internet?
- To increase internet speed
- To hide your online activity and protect your privacy
- To access restricted websites
- To disable firewall protection
A VPN is used to hide online activity and protect privacy.
5. Which of the following is a common form of online identity theft where attackers pretend to be someone you trust to obtain sensitive information?
- Hacking
- Malware
- Phishing
- Firewall
Phishing involves attackers pretending to be trusted entities to obtain sensitive information.
6. What is the best way to verify the authenticity of a website before entering personal information or making online purchases?
- Checking for a padlock icon in the browser's address bar
- Clicking on all pop-up ads
- Providing personal information without verification
- Downloading browser extensions from unverified sources
Checking for a padlock icon in the browser's address bar indicates a secure connection.
7. What is the term for a fraudulent attempt to obtain sensitive information, such as passwords and credit card numbers, by disguising as a trustworthy entity in electronic communication?
- Hacking
- Malware
- Phishing
- Encryption
Phishing is the fraudulent attempt to obtain sensitive information through deception.
8. Which of the following is NOT a good practice for online privacy and security?
- Sharing passwords with friends
- Using a secure and unique password for each account
- Logging out of accounts when not in use
- Avoiding public Wi-Fi for sensitive transactions
Sharing passwords with friends is not a good practice for online security.
9. What is the purpose of a firewall in computer security?
- To protect against malware
- To encrypt data
- To restrict unauthorized access to a network
- To back up data
A firewall is used to restrict unauthorized access to a network.
10. Which of the following is a common method for protecting your computer from malware and viruses?
- Downloading software from unverified sources
- Disabling antivirus programs
- Regularly updating antivirus software
- Using the same password for all accounts
Regularly updating antivirus software helps protect against malware and viruses.
11. What should you do if you receive an unsolicited email requesting personal information or money, especially from an unknown sender?
- Reply with the requested information
- Ignore the email
- Immediately provide the information
- Report the email as a phishing attempt
You should report the email as a phishing attempt and avoid providing any information.
12. What is the purpose of using two-factor authentication (2FA) for online accounts?
- To use the same password for multiple accounts
- To require a fingerprint scan for access
- To add an additional layer of security by requiring a second form of verification
- To bypass password requirements
2FA adds an additional layer of security by requiring a second form of verification.
13. Which of the following is a safe way to dispose of old electronic devices, such as smartphones and laptops, to protect your personal data?
- Throwing them in the trash
- Selling them online without wiping data
- Recycling them with data erasure
- Burying them in the backyard
Recycling devices with data erasure is a safe way to dispose of them.
14. What is the term for the practice of creating multiple copies of important data to prevent data loss in case of hardware failure or other disasters?
- Encryption
- Backup
- Firewall
- Phishing
Backup is the practice of creating copies of data to prevent data loss.
- To speed up internet browsing
- To improve website performance
- To protect online privacy and remove tracking data
- To disable browser extensions
Clearing cookies and cache helps protect online privacy and removes tracking data.
16. Which of the following is a recommended practice for securing your Wi-Fi network at home?
- Using the default Wi-Fi password provided by the manufacturer
- Disabling encryption to allow open access
- Changing the default Wi-Fi password and using strong encryption
- Broadcasting your Wi-Fi network name (SSID)
Changing the default Wi-Fi password and using strong encryption is recommended for security.
17. What is the term for software that blocks or filters out malicious or unwanted internet content, such as spam and malware?
- Firewall
- Antivirus
- Encryption
- Antispyware
Antispyware software blocks or filters out malicious or unwanted content.
18. What is the purpose of using a password manager tool?
- To generate and store strong, unique passwords
- To share passwords with friends and family
- To disable two-factor authentication (2FA)
- To use the same password for all accounts
A password manager generates and stores strong, unique passwords.
19. What should you do if you receive an email with an attachment from an unknown sender?
- Open the attachment immediately
- Download and run any executable files attached
- Delete the email without opening the attachment
- Reply to the email with your personal information
It's advisable to delete the email without opening the attachment from an unknown sender.
20. What is the primary purpose of encryption in online communication and data storage?
- To slow down data transmission
- To make data more vulnerable to attacks
- To protect data by encoding it into unreadable form
- To remove data from storage
Encryption protects data by encoding it into an unreadable form.
21. Which of the following is a common phishing attack that involves tricking users into clicking on a fake link and providing their login credentials?
- Malware
- Ransomware
- Spear phishing
- Phishing email
Phishing emails trick users into clicking on fake links and providing login credentials.
22. What is the purpose of setting up automatic software updates on your devices?
- To decrease device performance
- To save bandwidth
- To ensure that security patches and bug fixes are applied promptly
- To disable firewall protection
Automatic updates ensure that security patches and bug fixes are applied promptly.
23. Which of the following is NOT a common type of malware?
- Virus
- Worm
- Spyware
- Firewall
A firewall is not a type of malware; it is a security tool.
24. What is the purpose of regular data backups in the context of cybersecurity?
- To increase the risk of data loss
- To provide hackers with access to your data
- To recover data in case of data loss or cyberattacks
- To make data publicly available
Regular data backups help in recovering data in case of data loss or cyberattacks.
25. Which of the following actions can help protect your online privacy and reduce the risk of identity theft?
- Sharing personal information on social media
- Using public Wi-Fi for sensitive transactions
- Reviewing and adjusting privacy settings on social media platforms
- Clicking on suspicious links in emails
Reviewing and adjusting privacy settings on social media platforms can help protect online privacy.
- Phishing
- Ransomware
- Brute force attack
- Firewall breach
A brute force attack involves guessing passwords to gain unauthorized access.
27. Which of the following is a secure method for verifying the identity of a website before entering sensitive information?
- Ignoring website certificates
- Clicking on every link
- Checking for a valid SSL/TLS certificate
- Providing personal information without verification
Checking for a valid SSL/TLS certificate is a secure way to verify a website's identity.
28. What is the purpose of a CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) on websites?
- To slow down internet traffic
- To prevent automated bots from accessing the website
- To collect user information
- To display targeted ads
CAPTCHAs are used to prevent automated bots from accessing websites.
29. Which of the following is NOT a recommended practice for securing your smartphone or mobile device?
- Installing mobile security apps
- Enabling screen lock or passcode protection
- Downloading apps only from official app stores
- Sharing your device's passcode with friends
Sharing your device's passcode with others is not recommended for security.
30. What is the term for a type of malware that encrypts files on a victim's computer and demands a ransom for their release?
- Phishing
- Spyware
- Ransomware
- Firewall
Ransomware encrypts files and demands a ransom for decryption.
31. Which of the following is a safe practice when using public Wi-Fi networks?
- Sharing sensitive information without encryption
- Connecting to unsecured public Wi-Fi networks
- Disabling automatic Wi-Fi network connections
- Avoiding the use of virtual private networks (VPNs)
Disabling automatic Wi-Fi network connections can enhance security.
32. What is the purpose of end-to-end encryption in messaging apps?
- To slow down message delivery
- To display ads within messages
- To protect message content from eavesdroppers, including service providers
- To limit the number of messages sent
End-to-end encryption protects message content from eavesdroppers, including service providers.
33. Which of the following is NOT a common sign of a phishing email or message?
- Generic or misspelled sender email address
- Urgent requests for personal or financial information
- Official and trusted sender's address
- Embedded suspicious links
Phishing emails often use generic or misspelled sender email addresses, not official ones.
34. What is the primary purpose of a password policy in an organization's cybersecurity strategy?
- To make passwords easier to remember
- To require the use of weak passwords
- To establish security guidelines for password creation and management
- To store passwords in plain text
A password policy establishes guidelines for secure password creation and management.
- Sharing personal information publicly
- Accepting all friend requests without verification
- Reviewing and adjusting privacy settings
- Avoiding social media altogether
Reviewing and adjusting privacy settings on social media platforms can protect online privacy.
36. What is the purpose of using a virtual private network (VPN) when connecting to the internet?
- To increase internet speed
- To hide online activity and encrypt data traffic
- To display targeted ads
- To disable firewalls
A VPN is used to hide online activity and encrypt data traffic.
37. What is the term for a practice where an attacker observes and records a user's keystrokes to capture sensitive information, such as passwords and credit card numbers?
- Phishing
- Spyware
- Keylogging
- Ransomware
Keylogging involves capturing keystrokes to steal sensitive information.
38. What is the purpose of a privacy policy on a website or app?
- To share user data with third parties
- To slow down website loading
- To inform users about data collection and usage practices
- To request user login credentials
A privacy policy informs users about data collection and usage practices.
39. Which of the following is a secure method for securely disposing of physical documents containing sensitive information, such as bank statements?
- Throwing them in the trash
- Burning them in the backyard
- Shredding them before disposal
- Leaving them in a public place
Shredding documents before disposal is a secure method.
40. What is the purpose of using a secure and unique PIN (Personal Identification Number) for your mobile device or ATM card?
- To make it easier for others to access your device or account
- To use the same PIN for multiple devices and accounts
- To increase the risk of unauthorized access
- To protect your device or account from unauthorized use
A secure and unique PIN helps protect your device or account from unauthorized use.
41. Which of the following is a safe practice when receiving unsolicited phone calls or messages asking for personal information or money?
- Providing personal information without verification
- Ignoring the request and not responding
- Immediately sending money to the caller or sender
- Sharing all requested information
Ignoring unsolicited requests and not responding is a safe practice.
42. What is the primary purpose of regular software updates and patches in cybersecurity?
- To introduce new vulnerabilities
- To make software slower
- To fix security vulnerabilities and bugs
- To delete existing software
Regular updates and patches fix security vulnerabilities and bugs.
43. Which of the following actions can help protect your email privacy and security?
- Sharing your email password with friends
- Using strong and unique email passwords
- Clicking on all email attachments
- Providing personal information to unknown email senders
Using strong and unique email passwords helps protect email security.
44. What is the purpose of a digital signature in email communication?
- To add decorative elements to emails
- To verify the authenticity and integrity of the email
- To encrypt the entire email message
- To disable email attachments
A digital signature verifies the authenticity and integrity of an email.
45. Which of the following actions can help protect your online privacy and reduce the risk of identity theft when using public computers, such as in libraries or internet cafes?
- Logging in to your personal accounts
- Saving login credentials on public computers
- Logging out of accounts and not saving login information
- Sharing your personal information with others
Logging out of accounts and not saving login information on public computers enhances privacy.
46. What is the term for a type of malware that steals sensitive information, such as login credentials and credit card numbers, from a victim's computer?
- Phishing
- Ransomware
- Spyware
- Firewall
Spyware is malware that steals sensitive information from a computer.
47. What is the purpose of a secure socket layer (SSL) or transport layer security (TLS) in internet communication?
- To slow down data transmission
- To display ads
- To protect data by encrypting it during transmission
- To make data publicly available
SSL/TLS protects data by encrypting it during transmission.
48. Which of the following actions can help protect your online privacy when using search engines?
- Sharing personal information in search queries
- Clicking on all search results
- Using private browsing or incognito mode
- Disabling search history
Using private browsing or incognito mode can help protect online privacy during searches.
49. What is the purpose of setting up a guest network on your home Wi-Fi router?
- To limit internet access for all users
- To share your primary Wi-Fi password with guests
- To provide a separate network for guests with restricted access
- To disable Wi-Fi access
A guest network provides a separate network for guests with restricted access.
50. Which of the following is a common method for securing sensitive documents and files on a computer or mobile device?
- Sharing sensitive files openly
- Encrypting sensitive files with strong encryption
- Storing sensitive files in unprotected folders
- Providing unrestricted access to sensitive files
Encrypting sensitive files with strong encryption is a common method for security.