0% found this document useful (0 votes)
12 views

Practice Set-CSCU

Uploaded by

Jaser Altal
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

Practice Set-CSCU

Uploaded by

Jaser Altal
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

Practice Questions

1. What is a secure way to connect to a public Wi-Fi network?


- A. Using a VPN
- B. Disabling antivirus software
- C. Disabling firewall
- D. Using an open network

2. Which of the following is a method used to prevent phishing attacks?


- A. Clicking on links from unknown sources
- B. Using email filters
- C. Sharing personal information freely
- D. Disabling antivirus software

3. What should you do if your computer is infected with malware?


- A. Ignore it
- B. Run a full system scan with antivirus software
- C. Share the malware with friends
- D. Turn off the computer and never use it again

4. Which of the following is an example of a strong password?


- A. 123456
- B. Password
- C. Qw3rty!2020
- D. abcdef

5. What is the primary goal of encryption?


- A. To make data unreadable to unauthorized users
- B. To speed up data transfer
- C. To compress data
- D. To delete data
6. Which of the following is a common form of social engineering?
- A. Brute force attack
- B. Man-in-the-middle attack
- C. Phishing
- D. SQL injection

7. Why is it important to back up your data regularly?


- A. To free up space on your hard drive
- B. To ensure data can be recovered in case of loss or corruption
- C. To speed up your computer
- D. To share data with others

8. What does a firewall do?


- A. It scans for viruses
- B. It controls incoming and outgoing network traffic
- C. It defragments your hard drive
- D. It installs software updates

9. Which of the following is an example of a phishing email?


- A. An email from your bank asking for your account information
- B. An email from a friend sharing a funny video
- C. A newsletter from a subscribed service
- D. A reminder for a scheduled meeting

10. What is two-factor authentication?


- A. A method of securing an account with two levels of security
- B. A type of virus
- C. A firewall setting
- D. A password management tool

11. What is a common indicator of a malware infection?


- A. Increased internet speed
- B. Frequent pop-up ads
- C. Faster computer performance
- D. Reduced power consumption
12. How can you protect your personal information online?
- A. By sharing it on social media
- B. By using strong, unique passwords
- C. By clicking on suspicious links
- D. By disabling all security settings

13. What should you do if you receive an unexpected email attachment from a
known contact?
- A. Open the attachment immediately
- B. Delete the email without opening it
- C. Verify with the sender before opening the attachment
- D. Forward the email to your entire contact list

14. What is ransomware?


- A. A type of software that speeds up your computer
- B. A type of malware that encrypts your files and demands payment for
decryption
- C. A type of antivirus program
- D. A method for securely deleting files

15. How can you ensure your online transactions are secure?
- A. By using public Wi-Fi
- B. By checking for HTTPS in the URL
- C. By sharing your credit card information via email
- D. By disabling browser security settings

16. What is the purpose of antivirus software?


- A. To create documents
- B. To protect against malware
- C. To edit photos
- D. To play videos

17. What is a common sign of a phishing website?


- A. A legitimate-looking URL
- B. A misspelled or slightly altered URL
- C. An official logo
- D. High-quality images

18. Why should you avoid using public computers for online banking?
- A. Public computers are always safe
- B. Public computers may have keyloggers or malware installed
- C. Public computers have faster internet speeds
- D. Public computers have larger screens

19. What is the best way to protect your wireless network?


- A. By using WPA2 encryption
- B. By leaving it open
- C. By using WEP encryption
- D. By disabling encryption

20. What is a brute force attack?


- A. An attempt to guess a password by trying all possible combinations
- B. A method of encrypting data
- C. A technique to secure wireless networks
- D. A way to back up data

21. Which of the following is a good practice for email security?


- A. Using a single password for all accounts
- B. Opening attachments from unknown senders
- C. Enabling spam filters
- D. Disabling antivirus software

22. What should you do if you suspect your identity has been stolen?
- A. Ignore it
- B. Immediately report it to the relevant authorities and institutions
- C. Share your information with more people
- D. Change your email address
23. Which of the following is an example of a secure website?
- A. A site with HTTP in the URL
- B. A site with HTTPS in the URL
- C. A site with many pop-ups
- D. A site that requests your password frequently

24. Why is it important to use different passwords for different accounts?


- A. To make it easier to remember
- B. To enhance security and reduce the risk if one password is compromised
- C. To confuse hackers
- D. To comply with internet regulations

25. What is the best way to dispose of sensitive documents?


- A. Throwing them in the trash
- B. Shredding them
- C. Burning them
- D. Keeping them in a drawer

26. Which of the following is a feature of a secure password manager?


- A. It stores passwords in plain text
- B. It uses encryption to protect stored passwords
- C. It shares passwords with other users
- D. It requires frequent manual updates

27. What is an example of multi-factor authentication?


- A. Using a password and a security question
- B. Using a password and an SMS code
- C. Using a password and a captcha
- D. Using a password and a fingerprint

28. Why should you avoid clicking on links in unsolicited emails?


- A. They might contain viruses or lead to phishing websites
- B. They always provide useful information
- C. They are always safe
- D. They are usually jokes

29. What is a common risk of using outdated software?


- A. Increased compatibility with new files
- B. Exposure to unpatched security vulnerabilities
- C. Improved system performance
- D. Reduced hardware requirements

30. How can you protect your mobile device from threats?
- A. By installing apps from unknown sources
- B. By using a strong passcode or biometric lock
- C. By disabling security features
- D. By sharing it with others

31. What is a common method used by attackers to distribute malware?


- A. Email attachments
- B. Encrypted messages
- C. Secure websites
- D. Online advertisements

32. Why is it important to review your bank statements regularly?


- A. To check for errors or unauthorized transactions
- B. To update your account information
- C. To increase your account balance
- D. To share with friends
33. What should you do if you receive a suspicious phone call asking for personal
information?
- A. Provide the requested information
- B. Hang up and report the call to authorities
- C. Call the number back
- D. Share the number with others

34. How can you secure your online accounts?


- A. By using simple passwords
- B. By sharing passwords with friends
- C. By enabling two-factor authentication
- D. By writing passwords on sticky notes

35. What is the purpose of a software patch?


- A. To add new features
- B. To fix security vulnerabilities and bugs
- C. To slow down the software
- D. To delete data

36. What is the risk of using the same password across multiple sites?
- A. Increased security
- B. Easier account recovery
- C. Greater risk if one site is compromised
- D. Improved user experience

37. What should you do if you lose your mobile device?


- A. Nothing
- B. Immediately report it and use remote wipe features if available
- C. Buy a new device
- D. Ignore it
38. What is an indicator of a secure email?
- A. The presence of an attachment
- B. The use of HTTPS in the URL
- C. The sender's email address matches the domain of the sender's organization
- D. Frequent spelling errors

39. What is a common feature of secure websites?


- A. HTTP in the URL
- B. HTTPS in the URL and a padlock icon
- C. Pop-up ads
- D. Flashy graphics

40. What is a key step in protecting your home network?


- A. Disabling encryption
- B. Using default router settings
- C. Changing the default password of your router
- D. Allowing guest access

41. Why should you be cautious about downloading software from the internet?
- A. It can be expensive
- B. It may contain malware or unwanted programs
- C. It always comes with tech support
- D. It improves computer performance

42. What should you do before disposing of an old computer?


- A. Sell it as is
- B. Remove all personal data and perform a factory reset
- C. Throw it in the trash
- D. Donate it without any modifications

43. How can you recognize a secure payment website?


- A. By the presence of HTTPS and a padlock icon in the browser's address bar
- B. By colorful graphics
- C. By the number of pop-up ads
- D. By the absence of contact information
44. Why is it important to secure your IoT devices?
- A. They are always secure by default
- B. They can be exploited to gain access to your network
- C. They do not need security measures
- D. They are rarely targeted by attackers

45. What is the role of a VPN (Virtual Private Network)?


- A. To speed up internet connection
- B. To provide a secure connection over a public network
- C. To increase the storage capacity of your device
- D. To delete unwanted files

46. Which of the following is a characteristic of a secure password?


- A. Easy to remember
- B. Contains personal information
- C. Long and includes a mix of letters, numbers, and symbols
- D. Commonly used phrases

47. What is a key practice for maintaining online privacy?


- A. Sharing all personal information on social media
- B. Using privacy settings and being cautious about what you share
- C. Clicking on every link you see
- D. Disabling all security features

48. What is a common sign that your email account has been hacked?
- A. Receiving a lot of spam
- B. Not being able to send emails
- C. Finding emails in your sent folder that you did not send
- D. Faster email load times

49. Why should you use a password manager?


- A. To remember all your passwords for you
- B. To share your passwords easily
- C. To store your passwords securely and generate strong passwords
- D. To write down passwords on paper

50. What is a benefit of regularly updating your device’s operating system?


- A. Increased device storage
- B. Enhanced security and access to the latest features
- C. Slower device performance
- D. Increased battery consumption

Answers

1. A. Using a VPN
2. B. Using email filters
3. B. Run a full system scan with antivirus software
4. C. Qw3rty!2020
5. A. To make data unreadable to unauthorized users
6. C. Phishing
7. B. To ensure data can be recovered in case of loss or corruption
8. B. It controls incoming and outgoing network traffic
9. A. An email from your bank asking for your account information
10. A. A method of securing an account with two levels of security
11. B. Frequent pop-up ads
12. B. By using strong, unique passwords
13. C. Verify with the sender before opening the attachment
14. B. A type of malware that encrypts your files and demands payment for
decryption
15. B. By checking for HTTPS in the URL
16. B. To protect against malware
17. B. A misspelled or slightly altered URL
18. B. Public computers may have keyloggers or malware installed
19. A. By using WPA2 encryption
20. A. An attempt to guess a password by trying all possible combinations
21. C. Enabling spam filters
22. B. Immediately report it to the relevant authorities and institutions
23. B. A site with HTTPS in the URL
24. B. To enhance security and reduce the risk if one password is compromised
25. B. Shredding them
26. B. It uses encryption to protect stored passwords
27. B. Using a password and an SMS code
28. A. They might contain viruses or lead to phishing websites
29. B. Exposure to unpatched security vulnerabilities
30. B. By using a strong passcode or biometric lock
31. A. Email attachments
32. A. To check for errors or unauthorized transactions
33. B. Hang up and report the call to authorities
34. C. By enabling two-factor authentication
35. B. To fix security vulnerabilities and bugs
36. C. Greater risk if one site is compromised
37. B. Immediately report it and use remote wipe features if available
38. C. The sender's email address matches the domain of the sender's organization
39. B. HTTPS in the URL and a padlock icon
40. C. Changing the default password of your router
41. B. It may contain malware or unwanted programs
42. B. Remove all personal data and perform a factory reset
43. A. By the presence of HTTPS and a padlock icon in the browser's address bar
44. B. They can be exploited to gain access to your network
45. B. To provide a secure connection over a public network
46. C. Long and includes a mix of letters, numbers, and symbols
47. B. Using privacy settings and being cautious about what you share
48. C. Finding emails in your sent folder that you did not send
49. C. To store your passwords securely and generate strong passwords
50. B. Enhanced security and access to the latest features

You might also like