Unlock hundreds more features
Save your Quiz to the Dashboard
View and Export Results
Use AI to Create Quizzes and Analyse Results

Sign inSign in with Facebook
Sign inSign in with Google
Quizzes > Quizzes for Business > Technology

Test Your Knowledge with Online Safety Assessment Quiz

Assess Your Digital Safety Knowledge in Minutes

Difficulty: Moderate
Questions: 20
Learning OutcomesStudy Material
Colorful paper art displaying elements related to an Online Safety Assessment Quiz

This online safety quiz helps you spot gaps in how you handle phishing, privacy settings, and safe browsing. Answer 15 quick questions to find weak spots fast and see what to fix first. Want a different focus? Try the child version or the basic quiz .

Which of the following is a common sign of a phishing email?
Message from your official company email domain
No spelling mistakes and correct grammar
Accurate personalized details matching your profile
Unfamiliar sender address requesting personal information
Phishing emails often originate from spoofed or unfamiliar addresses asking for sensitive data. Recognizing an unknown sender requesting personal information helps detect fraudulent messages.
Which of the following is considered a strong password?
A single common word such as 'password'
An 8-digit number sequence like '12345678'
Your birthdate and initials
A 12-character string combining uppercase, lowercase, numbers, and symbols
A strong password uses length and complexity with varied character types. This approach raises the difficulty for attackers to guess or brute-force the password.
Which action is unsafe when using public Wi-Fi?
Accessing your online banking without a VPN
Connecting through a VPN before sending data
Browsing news websites over HTTPS
Streaming non-sensitive content on trusted sites
Public Wi-Fi networks are often unencrypted, exposing sensitive activities like banking to eavesdroppers. Using a VPN or sticking to encrypted sites mitigates this risk.
What is the primary purpose of two-factor authentication (2FA)?
To require an additional verification step beyond a password
To encrypt files on your device
To automatically back up data to the cloud
To increase internet connection speed
Two-factor authentication adds an extra layer of security by demanding a second form of verification such as a code or biometric factor. This makes unauthorized access harder even if a password is compromised.
Which privacy setting best restricts social media post visibility to only your friends?
Everyone
Only me
Friends only
Public
Choosing 'Friends only' ensures only your approved connections see your posts, enhancing privacy while still sharing with your network. Public or everyone settings expose posts to all users, while 'Only me' prevents friends from seeing content.
Which type of software is specifically designed to record keystrokes on a computer?
Firewall
Antivirus
Keylogger
Ad blocker
Keyloggers stealthily capture every keystroke made on a device, often without the user's knowledge. Firewalls regulate network traffic and do not record keystrokes.
Which indicator shows that a website is secured with HTTPS?
Images loading faster
A padlock icon next to the URL in the browser
A longer URL without 'https'
A red warning triangle in the address bar
A padlock icon signifies that the connection between the browser and server is encrypted using HTTPS. Other indicators like loading speed or URL length do not confirm encryption.
Seeing a URL spelled 'www.paypall.com' instead of 'www.paypal.com' is an example of what?
A legitimate alternative domain
A secure subdomain
An encrypted web address
A spoofed URL intended to deceive users
A minor alteration in a familiar domain name is a common technique to trick users into visiting fraudulent sites. Legitimate domains usually match exactly and do not rely on misspellings.
What setting adjustment helps limit who can view your social media posts?
Restricting the audience to friends only
Sharing posts in open groups
Accepting follow requests from everyone
Allowing public comments
Limiting post visibility to friends only ensures only trusted connections can see your content. Public comments and open group sharing expand visibility beyond your personal network.
What is the main advantage of using a VPN on public networks?
It blocks social media access
It speeds up the Wi-Fi connection
It encrypts your internet traffic to protect data
It removes all malware from websites
A VPN creates a secure tunnel that encrypts data between your device and the VPN server, preventing eavesdropping on public networks. It does not inherently speed up connections or remove malware.
Which practice helps secure personal data on mobile devices?
Leaving Bluetooth discoverable at all times
Disabling the screen lock
Jailbreaking or rooting the device
Regularly updating the device operating system
Keeping the operating system up to date ensures vulnerabilities are patched and security features are improved. Jailbreaking or leaving Bluetooth open exposes the device to additional risks.
How should you handle an unexpected email attachment from an unknown sender?
Save it to your desktop and scan later
Delete the email or verify the sender before opening
Open it immediately to see its contents
Forward it to all your contacts
Unexpected attachments may contain malware, so it's safer to delete the email or confirm its legitimacy with the sender. Opening unknown files directly risks infecting your device.
Which method is the most secure for managing unique passwords for multiple accounts?
Using a reputable password manager application
Reusing a single strong password everywhere
Writing them down in a notebook
Creating passwords based on the website name
Password managers generate and store unique, complex passwords for each account, reducing the risk of reuse or weak credentials. Manually tracking or reusing passwords increases vulnerability.
Before entering sensitive information online, what should you always verify?
That the page has many advertisements
The site's color scheme
That the site's URL begins with 'https://'
The number of images on the page
HTTPS indicates that communications between your browser and the website are encrypted. Visual design elements like color schemes or ads do not guarantee a secure connection.
Which action helps reduce cross-site tracking in web browsers?
Disabling the firewall
Enabling private browsing or regularly clearing cookies
Using public Wi-Fi
Accepting all cookie prompts
Private browsing modes and clearing cookies prevent trackers from accumulating data across sessions. Disabling security features or accepting all cookies increases exposure to tracking.
A website's privacy policy states it shares data with third-party analytics services. Which setting should you adjust to limit this?
Data sharing or app permission settings
Ad blocker preferences
Two-factor authentication settings
Post visibility settings
Modifying data sharing or app permissions can restrict which third parties have access to your information. Two-factor authentication and post visibility do not control backend data transfers.
Which vulnerability allows attackers to inject malicious scripts into trusted websites viewed by other users?
Cross-site scripting (XSS)
Man-in-the-middle attack
Phishing
Password spraying
Cross-site scripting exploits insecure web page code to insert and execute malicious scripts in users' browsers. Other attack types involve credentials or intercepting communications rather than code injection.
What differentiates spear phishing from a general phishing attack?
It only occurs on social media platforms
It targets a specific individual or organization with personalized information
It always uses telephone calls instead of email
It is a form of ransomware
Spear phishing crafts messages specifically tailored to a target, often using personal or organizational details, increasing effectiveness. General phishing casts a wide net without customization.
What is credential stuffing, and how can you defend against it?
Sending deceptive emails for credentials; defend by training users
Using default passwords on devices; defend by changing default passwords
Testing multiple passwords manually; defend by locking accounts
Automated use of stolen credentials on multiple sites; defend by using unique passwords and multi-factor authentication
Credential stuffing involves automated attempts using leaked username-password pairs across various services. Unique passwords and multi-factor authentication prevent attackers from reusing credentials on different sites.
What is vishing, and what is an effective way to protect yourself from it?
Voice-based phishing over phone calls; verify caller identity before sharing personal information
Video phishing through fake streaming sites; install video blockers
Physical theft of voice data; use voice encryptors
SMS phishing via text messages; delete all texts
Vishing uses phone calls to trick individuals into revealing sensitive information. Confirming the caller's authenticity before disclosing any details helps mitigate this risk.
0
{"name":"Which of the following is a common sign of a phishing email?", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Which of the following is a common sign of a phishing email?, Which of the following is considered a strong password?, Which action is unsafe when using public Wi-Fi?","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}

Learning Outcomes

  1. Identify common online threats and safety vulnerabilities.
  2. Evaluate secure practices for protecting personal information.
  3. Apply strategies to recognize and avoid phishing scams.
  4. Demonstrate safe browsing habits across different devices.
  5. Analyse privacy settings and enhance social media security.
  6. Master responsible digital communication and password management.

Cheat Sheet

  1. Recognize Common Online Threats - Fun but crucial: phishing scams, malware, and crafty social engineering tactics all want to nab your personal info! Spotting these digital baddies early turns you into a cybersecurity ninja. Protecting Yourself Against Phishing
  2. Evaluate Secure Practices for Personal Information - Before you share your secrets, double-check who's asking and if their channel is locked down tight. Strong, unique passwords and multi-factor authentication give hackers a serious headache. Phishing Tips
  3. Apply Strategies to Recognize and Avoid Phishing Scams - Watch for urgent emails begging for clicks, sketchy senders, or weird URLs hiding behind friendly text. Hover over links like a detective to peek at the real address before you click! Tips and Strategies
  4. Demonstrate Safe Browsing Habits Across Devices - Keep your browser and operating system updated so they can block the latest cyber-villains, and use trusted antivirus software to keep your shields up. Avoid dubious websites and clear your history and cookies regularly to stay stealthy. Phishing Tips Highlight
  5. Analyze Privacy Settings and Enhance Social Media Security - Tweak your profile settings like a privacy pro: decide who sees what and keep unwanted eyes out. The less personal info you share publicly, the harder it is for identity thieves to strike. Avoid Being a Phishing Victim
  6. Master Responsible Digital Communication and Password Management - Use a password manager to create and guard strong, unique passwords for every account - no repeats allowed! And always communicate respectfully online to keep your digital footprint squeaky clean. Phishing Tips
  7. Understand the Importance of Software Updates - Think of updates as power-ups: they patch security holes and keep you one step ahead of cyber-villains. Enable automatic updates and let your devices level up on their own. Phishing Tips Highlight
  8. Recognize the Signs of a Secure Website - A legit site flaunts HTTPS and a little padlock icon - your green light to share sensitive data. If the certificate seems fishy or missing, hit the brakes and back out. Phishing Tips
  9. Be Cautious with Email Attachments and Links - Attachments and links from strangers can be Trojan horses; don't open or click until you're sure who sent them. When in doubt, verify the sender through another channel. Don't Get Phished
  10. Report Suspicious Activities - Spotted a phishy email or sketchy link? Be a cyber hero and report it to your IT squad or the authorities. Quick action helps protect everyone from digital disasters. Avoid Being a Phishing Victim
Powered by: Quiz Maker