Practice Set-CSCU
Practice Set-CSCU
13. What should you do if you receive an unexpected email attachment from a
known contact?
- A. Open the attachment immediately
- B. Delete the email without opening it
- C. Verify with the sender before opening the attachment
- D. Forward the email to your entire contact list
15. How can you ensure your online transactions are secure?
- A. By using public Wi-Fi
- B. By checking for HTTPS in the URL
- C. By sharing your credit card information via email
- D. By disabling browser security settings
18. Why should you avoid using public computers for online banking?
- A. Public computers are always safe
- B. Public computers may have keyloggers or malware installed
- C. Public computers have faster internet speeds
- D. Public computers have larger screens
22. What should you do if you suspect your identity has been stolen?
- A. Ignore it
- B. Immediately report it to the relevant authorities and institutions
- C. Share your information with more people
- D. Change your email address
23. Which of the following is an example of a secure website?
- A. A site with HTTP in the URL
- B. A site with HTTPS in the URL
- C. A site with many pop-ups
- D. A site that requests your password frequently
30. How can you protect your mobile device from threats?
- A. By installing apps from unknown sources
- B. By using a strong passcode or biometric lock
- C. By disabling security features
- D. By sharing it with others
36. What is the risk of using the same password across multiple sites?
- A. Increased security
- B. Easier account recovery
- C. Greater risk if one site is compromised
- D. Improved user experience
41. Why should you be cautious about downloading software from the internet?
- A. It can be expensive
- B. It may contain malware or unwanted programs
- C. It always comes with tech support
- D. It improves computer performance
48. What is a common sign that your email account has been hacked?
- A. Receiving a lot of spam
- B. Not being able to send emails
- C. Finding emails in your sent folder that you did not send
- D. Faster email load times
Answers
1. A. Using a VPN
2. B. Using email filters
3. B. Run a full system scan with antivirus software
4. C. Qw3rty!2020
5. A. To make data unreadable to unauthorized users
6. C. Phishing
7. B. To ensure data can be recovered in case of loss or corruption
8. B. It controls incoming and outgoing network traffic
9. A. An email from your bank asking for your account information
10. A. A method of securing an account with two levels of security
11. B. Frequent pop-up ads
12. B. By using strong, unique passwords
13. C. Verify with the sender before opening the attachment
14. B. A type of malware that encrypts your files and demands payment for
decryption
15. B. By checking for HTTPS in the URL
16. B. To protect against malware
17. B. A misspelled or slightly altered URL
18. B. Public computers may have keyloggers or malware installed
19. A. By using WPA2 encryption
20. A. An attempt to guess a password by trying all possible combinations
21. C. Enabling spam filters
22. B. Immediately report it to the relevant authorities and institutions
23. B. A site with HTTPS in the URL
24. B. To enhance security and reduce the risk if one password is compromised
25. B. Shredding them
26. B. It uses encryption to protect stored passwords
27. B. Using a password and an SMS code
28. A. They might contain viruses or lead to phishing websites
29. B. Exposure to unpatched security vulnerabilities
30. B. By using a strong passcode or biometric lock
31. A. Email attachments
32. A. To check for errors or unauthorized transactions
33. B. Hang up and report the call to authorities
34. C. By enabling two-factor authentication
35. B. To fix security vulnerabilities and bugs
36. C. Greater risk if one site is compromised
37. B. Immediately report it and use remote wipe features if available
38. C. The sender's email address matches the domain of the sender's organization
39. B. HTTPS in the URL and a padlock icon
40. C. Changing the default password of your router
41. B. It may contain malware or unwanted programs
42. B. Remove all personal data and perform a factory reset
43. A. By the presence of HTTPS and a padlock icon in the browser's address bar
44. B. They can be exploited to gain access to your network
45. B. To provide a secure connection over a public network
46. C. Long and includes a mix of letters, numbers, and symbols
47. B. Using privacy settings and being cautious about what you share
48. C. Finding emails in your sent folder that you did not send
49. C. To store your passwords securely and generate strong passwords
50. B. Enhanced security and access to the latest features