0% found this document useful (0 votes)
33 views8 pages

Online Safety and Cybersecurity Quiz

The document is a long quiz focused on empowerment technologies, specifically addressing online safety, netiquette, and the risks associated with sharing personal information. It includes multiple-choice questions about internet security, types of malware, safe online practices, and how to handle online interactions. The quiz aims to educate individuals on maintaining their safety and privacy while using the internet.

Uploaded by

ROEL MADARCOS
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views8 pages

Online Safety and Cybersecurity Quiz

The document is a long quiz focused on empowerment technologies, specifically addressing online safety, netiquette, and the risks associated with sharing personal information. It includes multiple-choice questions about internet security, types of malware, safe online practices, and how to handle online interactions. The quiz aims to educate individuals on maintaining their safety and privacy while using the internet.

Uploaded by

ROEL MADARCOS
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

EMPOWERMENT TECHNOLOGIES

LONG QUIZ

1. It refers to the online security or safety of


people and their information when using
internet.
a. Internet b. Internet Safety
b. c. Netiquette d. Malware

2. Is concerned with the "proper" manner of


communication in the online environment.
a. Internet Safety b. Netiquette
b. c. Cybercrime d. Ethics

3. Sharing this information is a huge risk.


Strangers may pretend or use their identity to
dupe you.
a. Firstname b. Lastname
c. Cellphone number d.Name of your
Parents or Siblings

4. Very vulnerable to being searched for using


search engines like image search.
a. Firstname b. Lastname
c. Cellphone number d.Home Phone
Number

5. You must install and update an antivirus


software on your computer.
a. True b. False

6. A malicious program designed to replicate


itself and transfer from one computer to another
a. Virus b. Trojan
c. Spam d. Worm

7. A software intentionally designed to cause


harm or disruption to a computer, server, client,
or computer network, leak private information,
gain unauthorized access to information or
systems, deprive users access to information or
which unknowingly interferes with the user's
computer security and privacy. It is also known
as malicious software.
a. Software b. Hardware
c. Malware d. Application

8. A flame is:
a. An online chain letter
b. A post or email message that expresses
a strong opinion or criticism
c. A person who consistently breaks the
rules of netiquette
d. All of the above

9. What should you NEVER do if you get an


embarrassing picture from someone?
a. Talk to the person again c. Tell your
parents or a teacher
b. Send it on to other friends d.
Discourage the person from sending
pictures like that

10. A malicious program that disguised as


useful or legitimate program that user will
accept and use but take control of your
computer.
a. Virus b. Trojan c. Worm
d. Spyware

11. Lyn is on Facebook and receives a friend


request from a boy named Rios which she
doesn’t know. What should she do?
a. Accept the friend request. It’s rude to
ignore him
b. Deny the friend request
c. Send him a message and ask him how
he knows her
d. Stalk his account before accepting his
request

12. Jeric unlocks his smartphone and notices he


has 12 apps that need to be updated. What
should he do?
a. Ignore the prompt to update b. Update
the apps c. Reboot the phone d. Both
A&C

13. How to make your wifi private?


a. Add password c. Do not tell
your neighbor about it
b. Use your wifi late at night d. All of
these

14. The following are the tips on how to stay


safe online except;
a. Think before you click c. Do
not talk to strangers
b. Add friends you know in real life
d. None of these
15. After a disagreement at school, a group of
kids send Jerome threatening messages on
Facebook. What should he do?
a. Block them from his page c.
Tell his parents
b. Keep the emails and comments he
receives d. All of the above

16. What’s a good strategy for keeping your


passwords safe?
a. Use a long string of random letters and
numbers for each password. Write them on
a post-it note and stick it near your
computer so you don’t forget.
b. Come up with a secure password you
can remember and use it for every online
account
c. Choose a unique memorable
phrase/sentence for each account
d. All of the above

17. Which of the following is NOT an online


threat?
a. Phishing b. Browsing c. Identity
theft d. None of the above
18. It is recommended to reuse your password
on multiple sites to make it easier to remember
a. True b. False
19. It is OK to forward or post an email
message that you received if:
a. The message is typed in all caps
b. The author of the message has given
you permission to post it
c. It does not contain any copyrighted
material
d. The author of the message hasn’t
marked it as confidential

20. Which of the following answer lists an


example of spyware?
a. Keylogger b. Computer worm c.
Adware d. Virus

21. You don’t have to worry when you visit your


favorite sites, like Facebook and gaming sites,
because they are safe from spyware, malware
and other online threats.
a. True b. False
22. Below are the best way to use Facebook,
Tumblr, Instagram and other social networking
sites except;
a. Limit the amount of information I share
about myself
b. Only talk to people I know
c. Make my page private, except to the
people I have as my friends
d. All of the above
23. You posted a picture online, but soon
decided to take it down. You are worried your
friend may see it, but then soon remember that
person DOES NOT have a computer. Your friend
will never see the photo.
a. True b. False

24. Someone you really like has asked you to


send them a revealing photo of yourself. Why
could doing so put you at risk?
a. If the relationship turns bitter, they
could share it online
b. They might show their friends, which
could be embarrassing for you
c. The app/device/website used to share
the photo could be hacked
d. All of the above
25. When
someone asks for personal information like
phone numbers or addresses online, you should:
a. Give the information to anyone who asks
because it's the polite thing to do.
b. Post the information on any public Web site
so anyone can find it.
c. Share personal information to meet new
friends and have an active social life.
d. Never give out personal information online in
emails or instant messages because you never
know who you are really communicating with.

“The best preparation for tomorrow is doing your


best today.” --- H. Jackson Brown, Jr.

You might also like