About This Quiz
Safety first, when you go online! Each day, it gets harder and harder to keep yourself protected when browsing online. There is always a new piece of technology that can make your data so much harder to protect. However, there are many methods you can use to help yourself. They may be tedious, like security questions or simple like two-factor authentication, but they're all useful tools. So, you think you know how to stay safe online?
Do you know about the different types of hackers and why they hack? What about the techniques they use to hack individuals or companies? Do you know what qualifies as hacking? So you know all of those, but do you know what a keylogger does? The world of hacking can be complicated!
Do you know how to protect yourself online? Do you know what a firewall does to protect you? How do you create a strong, perfectly crafted password? What about how to protect yourself from malware? It's all important stuff to know when protecting yourself on the net!
So, if you're the IT expert in your family or the tech-savvy one in your friend group, what are you waiting for? Take the quiz to see how safe you really are when you're on the web!
A strong password usually contains numbers along with special characters that are not in a sequence that is easy to guess. Things like birthdays, phone numbers or other numbers that are important in your life are probably not a good idea to use as passwords.
Advertisement
If you receive an email that looks suspicious or malicious, delete it without opening it. If it claims to be from a company that you know and trust, you could first contact that company through their website - not by replying to the email in order to verify its validity.
Advertisement
Security questions are a common way to help keep your account safe, as they ask information that others would typically not know about you. These can include things like the first street you lived on or your kindergarten teacher's name.
Advertisement
Grey hat hackers do good, but they are commonly individuals who sell something to a larger organization. For example, they may find something wrong with a program, and sell the information on the vulnerability back to the company so that they can fix it.
Advertisement
This is true. Bluetooth is just as susceptible to being hacked as Wifi is. It can lead to the same security problems as hacking over wifi, such as malware and spying.
Advertisement
A direct access attack is typically an attack that is done physically and in person by the hacker. This means that they can go to the computer and take information from it or gain access to other things through it, as well as install malicious software onto it.
Advertisement
Eavesdropping can also be a form of hacking, as it involves connecting into a line to listen to a conversation. This is a breach of privacy that can be quite dangerous.
Advertisement
If you receive an unexpected payment in the form of an email from a company, you should first report it to that company. They can verify if it is legitimate or if it is likely fraud. Do not click any links or buttons within the email, as it can be very dangerous if it is in fact fraud.
Advertisement
Two-factor authentication is a security process that protects online accounts even further than a username and password. It typically includes a code that no one except the account holder knows.
Advertisement
This is true. Cell phones are vulnerable to being hacked, not only by tapping into your phones calls, but through other means as well. Hackers are able to hijack your phone and remotely access all of your photos, texts and other information, as well as take control.
Advertisement
The acronym VPN stands for Virtual Private Network. This is used to provide extra security when browsing the internet by connecting to a larger network in another place. The larger network is typically more secure than the user's network.
Advertisement
Malware is, quite literally, malicious software, as it is intended to do harm to your computer. There are many types of malware, including spyware, adware and trojans.
Advertisement
A drive lock is used to protect hard drives from hackers, using a password. Unless you have the password to the hard drive, you would not be able to access any of its files.
Advertisement
An ethical hacker is also called a white hat hacker. These hackers are not malicious - they work for companies to improve their security and protect their users. They do it for the greater good, rather than for personal or financial gain.
Advertisement
Cyberwarfare is the term used for this, as it is a type of technological battle between systems. This typically takes place on a very large scale, as countries themselves battle it out against each other online.
Advertisement
Pinging is the process of checking a connection to a computer. In order to verify the connection after the ping is sent out, a reply is sent from the network or device to confirm its connection.
Advertisement
MyDoom was a large virus that entered Windows computers through emails. The first bout of it took place in 2004, and has since returned a few times.
Advertisement
This is false. Small business are just as vulnerable to attacks as anyone else. Many times, small businesses don't have an IT person to keep watch over their systems. This can lead to trouble if they're ever infected with a virus.
Advertisement
A security analyst looks for problems or issues that arise in the area of cybersecurity. Large companies often hire them to perform tests on their systems to make sure that everything is as safe as possible.
Advertisement
"Hacktivism" is a term used when hacking for social change. Often, this type of hacking is done for greater good, but it can still be a dangerous practice for the participants.
Advertisement
Hackers will often sell exploit kits to individuals who are inexperienced at hacking. Such kits come packed with viruses to infect the computer.
Advertisement
This is true. What may appear to be a safe, harmless ad on the side of a page can in fact spread malware to your computer. This can even happen if the ad is not clicked, making it that much more effective to spread to many users.
Advertisement
A firewall monitors traffic and blocks anything that it finds suspicious. Firewalls can be an important tool to prevent hackers from accessing your computer and files, although it may not be all you need to stop them completely.
Advertisement
The internet of things is a term for anything in the world that uses technology. This can include the cell phones we carry with us daily to the cars that we use to get from place to place, to our appliances. As long as they use internet, they qualify.
Advertisement
Large corporations and online retailers typically have a massive customer base that uses credit cards to make purchases. Many attacks on these companies are done to receive this customer information and credit card data for their own gain.
Advertisement
This is true. In today's age, almost everything uses technology. This means that it is extra important that companies hire a team of trained professionals to keep everything safe, internally and externally.
Advertisement
Clickjacking is the practice of making someone believe they are clicking on something legitimate, when they are in fact clicking on an invisible, malicious link. This can spread malware easily to many people.
Advertisement
Key loggers are used to record anything that is typed into a person's keyboard. This can even be done by a workplace. Commonly, key loggers are used by hackers to steal information such as passwords or banking information.
Advertisement
Doing a security scan regularly can decrease the chance of your computer getting a virus. The scan will detect the virus and do what it can to eliminate it and keep your data safe.
Advertisement
Apps that you can download from the app store seem so harmless and fun. But if they aren't from a trusted source, there is a chance that they can also infect your phone or computer. To be on the safe side, it is better to only download apps from trusted developers.
Advertisement
Viruses are very easy to get, but to minimize that risk, only visit trusted websites that you know. Malicious websites can send viruses to your computer without your knowledge, making the attacks hard to recognize and eliminate.
Advertisement
Your computer won't pick up a virus from the game "Minesweeper" that is often found on Windows computers! This came pre-installed, so there is no reason to worry - it came right from Microsoft.
Advertisement
Sometimes, spam texts pop up in our messages. These usually contain a link or direction in order to get us to do something. These links can infect cell phones and should not be clicked on. However, you can report these messages to your carrier.
Advertisement
This is true. Many different brands of electronic medical devices have been proven vulnerable to hackers. This is an extreme threat to the well-being and life of the people who use these devices to live everyday.
Advertisement
Installing anti-virus software is the first step into keeping your computer safe from malicious software and viruses. There are also a few other ways, like using strong passwords and keeping your personal information safe.
Advertisement