Cyber Safety Quiz

/15
2 votes, 5 avg
22

Cyber Safety Quiz

Yaksas Cyber Safety is an initiative to create a more cyber aware society. You can join this group to learn how to keep yourself and your loved ones safe in the cyber world. You can also ask any cyber safety related questions.

WhatsApp Group Link: https://yks.red/cybersafety

Copyright 2024 Yaksas Security. All rights reserved.

1 / 15

Which is the real website of Gmail?

2 / 15

Using a ________ can keep your information safe while connected to free / public Wi-Fi ?

3 / 15

Amazon stores, everything you ever said to Alexa, on their servers and uses these recordings to train Alexa. Do you want this statement to be True or False?

4 / 15

One day Z found that all their data has been encrypted. Their computer screen is displaying a ransom note, asking crypto currency in exchange for decrypting their data. What measure can neutralise this attack?

5 / 15

Until what age most social media websites restrict children from creating an account and others require guardian details to be entered?

6 / 15

What can happen if your home wifi is protected with a weak password?

A. People can misuse the wifi connection
B. People can take over the wifi connection
C. Wifi connection can be used for wrong purposes

7 / 15

Z searched for a product online. They clicked the 1st link and purchased it. The product turned out to be fake. What went wrong here?

8 / 15

Solve the riddle: What is six of six digits / alphabets, not your birth date and must not be shared with anyone

9 / 15

A citizen can arrest a person, if the person is found committing a non-bailable offence as per IPC and CrPC?

10 / 15

In India, where can one report a cybercrime?
A. National Cybercrime Reporting Portal
B. Cybercrime helpline
C. Nearest local Police station
D. Nodal cyber cell

11 / 15

Which of these one should never post on a Social Media profile?
A. Govt. issued IDs
B. Bank statements
C. Pics of certificates
D. Vacation plans

12 / 15

Mr. Z used a computer to transfer their black money to an offshore account. This is a cyber crime?

13 / 15

You received an OTP and following it a call asking for the OTP. What should you do?
A. Share the OTP
B. Ask the caller why they need the OTP
C. Do not entertain the caller
D. Block / report the calling number
E. Check how the caller was generated the OTP

14 / 15

Z’s friend offered to install a pirated version of anti-virus software on their computer. Their friend promised that it will work exactly as the paid version. What can go wrong if Z agrees?
A. The pirated version may itself be infected
B. It can stop working any time
C. It might not receive updates

15 / 15

Among the following, which is the most non-intrusive way of monitoring a child’s internet activity?

Your score is

0%

Please rate this quiz