Professional Documents
Culture Documents
8. What is the best practice for keeping your computer and software up to
date?
a) Never update software as it may cause compatibility issues
b) Only update software once a year to avoid disruptions
c) Regularly install updates and patches from trusted sources
d) Ignore software update notifications
10.What should you do if you suspect your computer has been infected with
malware?
a) Share your suspicions on social media platforms
b) Ignore the issue and continue using the computer
c) Run a reputable antivirus scan to detect and remove the malware
d) Delete all your files and reinstall the operating system
13.What is the best way to identify a secure website for online shopping?
a) Check if the website has a catchy design and attractive offers
b) Look for a lock icon in the address bar and an "https" in the URL
c) Share personal information on the website to verify its security
d) Click on links provided in pop-up ads for additional information
19.What is the best practice for securely disposing of old electronic devices?
a) Throwing them in the trash bin
b) Donating them to charity organizations
c) Selling them online without wiping the data
d) Performing a factory reset and securely erasing all data
20.What is the primary objective of cybersecurity?
a) To eliminate all cyber threats completely
b) To reduce the impact of cyberattacks and protect information
systems
c) To develop new technologies for faster internet speed
d) To increase the number of online transactions
21.What is the purpose of a strong firewall in a computer network?
a) To protect against physical theft of devices
b) To encrypt data transmission for secure communication
c) To provide faster internet speed
d) To monitor and block unauthorized access to the network
28.What is the best practice for securing your smartphone or mobile device?
a) Disable all security features to improve performance
b) Install applications from unknown sources
c) Set a secure lock screen passcode or PIN
d) Share personal information on social media platforms
33.What is the best practice for securing your home Wi-Fi network?
a) Keeping the default network name (SSID) and password
b) Sharing the network password with neighbors for convenience
c) Changing the default network name (SSID) and using a strong
password
d) Disabling encryption to increase internet speed
34.What is the purpose of regular cybersecurity training for employees in
organizations?
a) To increase internet speed for better productivity
b) To identify and fix security vulnerabilities in computer systems
c) To educate employees about potential threats and safe practices
d) To develop new technologies for secure communication
43.What is the best practice for handling suspicious phone calls or messages
asking for personal information?
a) Providing the requested information to avoid any consequences
b) Ignoring the call or message and not responding
c) Sharing personal information to verify the identity of the caller
d) Calling back the number to confirm the legitimacy of the request
48.What is the best practice for securing a computer or device from malware?
a) Downloading and installing software from untrusted sources
b) Disabling automatic software updates for better performance
c) Using reputable antivirus software and keeping it up to date
d) Sharing personal information on public forums