1. You receive a browser pop-up on a trusted site saying “Your system is infected - call this number!” What should you do?
2. Your friend texts you a one-time code to log into a shared streaming account. That’s an example of:
3. What is encryption?
5. You’re asked to create a password for a work system. Which is best?
6. An email arrives from your manager with an attachment you weren’t expecting. You should:
7. What is the purpose of a VPN?
8. If your computer prompts you to install an update, the best practice is to:
9. Which authentication factor is “something you have”?
10. Your company requires you to use a password manager. The main benefit is:
11. You accidentally visit a malicious site. To prevent re-infection in the future, you should:
12. What is a fundamental method to determine if a web page you are visiting is encrypted?
13. Your team uses shared cloud storage. To keep files secure, you should:
15. Your antivirus flags a file as suspicious. You:
16. You create two accounts: one for work, one for personal use. This is an example of:
17. Which is an example of an IP address and port combination?
18. Which action best illustrates “monitoring”?
19. What’s the primary difference between hashing and encryption?
20. You’re setting up a new router. Choosing a non-default administrator password is important because:
21. Explain why it’s safer to use different passwords for work and personal accounts.
22. Describe a real-world analogy for encrypting a file before sending it over the internet.
23. Outline three steps you’d take if you suspected your email was hacked.
24. Give an example from daily life that demonstrates why “least privilege” matters.
25. In your own words, why is regularly updating software as important as locking your front door?