Unlock hundreds more features
Save your Quiz to the Dashboard
View and Export Results
Use AI to Create Quizzes and Analyse Results

Sign inSign in with Facebook
Sign inSign in with Google

Test Your Knowledge with Online Safety Assessment Quiz

Assess Your Digital Safety Knowledge in Minutes

Difficulty: Moderate
Questions: 20
Learning OutcomesStudy Material
Colorful paper art displaying elements related to an Online Safety Assessment Quiz

Are you ready to test your cyber safety skills? This online safety quiz delivers 15 insightful questions to boost your digital safety awareness and privacy know-how. Ideal for both learners and educators, it's fully editable in our editor - try our Child Online Safety Quiz or the Basic Online Quiz Assessment to tailor your practice. Don't forget to browse more quizzes and strengthen your safe browsing habits today.

Which of the following is a common sign of a phishing email?
Accurate personalized details matching your profile
No spelling mistakes and correct grammar
Message from your official company email domain
Unfamiliar sender address requesting personal information
Phishing emails often originate from spoofed or unfamiliar addresses asking for sensitive data. Recognizing an unknown sender requesting personal information helps detect fraudulent messages.
Which of the following is considered a strong password?
Your birthdate and initials
A 12-character string combining uppercase, lowercase, numbers, and symbols
An 8-digit number sequence like '12345678'
A single common word such as 'password'
A strong password uses length and complexity with varied character types. This approach raises the difficulty for attackers to guess or brute-force the password.
Which action is unsafe when using public Wi-Fi?
Accessing your online banking without a VPN
Browsing news websites over HTTPS
Streaming non-sensitive content on trusted sites
Connecting through a VPN before sending data
Public Wi-Fi networks are often unencrypted, exposing sensitive activities like banking to eavesdroppers. Using a VPN or sticking to encrypted sites mitigates this risk.
What is the primary purpose of two-factor authentication (2FA)?
To encrypt files on your device
To require an additional verification step beyond a password
To increase internet connection speed
To automatically back up data to the cloud
Two-factor authentication adds an extra layer of security by demanding a second form of verification such as a code or biometric factor. This makes unauthorized access harder even if a password is compromised.
Which privacy setting best restricts social media post visibility to only your friends?
Everyone
Friends only
Public
Only me
Choosing 'Friends only' ensures only your approved connections see your posts, enhancing privacy while still sharing with your network. Public or everyone settings expose posts to all users, while 'Only me' prevents friends from seeing content.
Which type of software is specifically designed to record keystrokes on a computer?
Ad blocker
Firewall
Antivirus
Keylogger
Keyloggers stealthily capture every keystroke made on a device, often without the user's knowledge. Firewalls regulate network traffic and do not record keystrokes.
Which indicator shows that a website is secured with HTTPS?
A longer URL without 'https'
A red warning triangle in the address bar
A padlock icon next to the URL in the browser
Images loading faster
A padlock icon signifies that the connection between the browser and server is encrypted using HTTPS. Other indicators like loading speed or URL length do not confirm encryption.
Seeing a URL spelled 'www.paypall.com' instead of 'www.paypal.com' is an example of what?
An encrypted web address
A secure subdomain
A spoofed URL intended to deceive users
A legitimate alternative domain
A minor alteration in a familiar domain name is a common technique to trick users into visiting fraudulent sites. Legitimate domains usually match exactly and do not rely on misspellings.
What setting adjustment helps limit who can view your social media posts?
Allowing public comments
Sharing posts in open groups
Accepting follow requests from everyone
Restricting the audience to friends only
Limiting post visibility to friends only ensures only trusted connections can see your content. Public comments and open group sharing expand visibility beyond your personal network.
What is the main advantage of using a VPN on public networks?
It blocks social media access
It removes all malware from websites
It encrypts your internet traffic to protect data
It speeds up the Wi-Fi connection
A VPN creates a secure tunnel that encrypts data between your device and the VPN server, preventing eavesdropping on public networks. It does not inherently speed up connections or remove malware.
Which practice helps secure personal data on mobile devices?
Disabling the screen lock
Leaving Bluetooth discoverable at all times
Regularly updating the device operating system
Jailbreaking or rooting the device
Keeping the operating system up to date ensures vulnerabilities are patched and security features are improved. Jailbreaking or leaving Bluetooth open exposes the device to additional risks.
How should you handle an unexpected email attachment from an unknown sender?
Save it to your desktop and scan later
Delete the email or verify the sender before opening
Forward it to all your contacts
Open it immediately to see its contents
Unexpected attachments may contain malware, so it's safer to delete the email or confirm its legitimacy with the sender. Opening unknown files directly risks infecting your device.
Which method is the most secure for managing unique passwords for multiple accounts?
Using a reputable password manager application
Creating passwords based on the website name
Reusing a single strong password everywhere
Writing them down in a notebook
Password managers generate and store unique, complex passwords for each account, reducing the risk of reuse or weak credentials. Manually tracking or reusing passwords increases vulnerability.
Before entering sensitive information online, what should you always verify?
That the page has many advertisements
That the site's URL begins with 'https://'
The number of images on the page
The site's color scheme
HTTPS indicates that communications between your browser and the website are encrypted. Visual design elements like color schemes or ads do not guarantee a secure connection.
Which action helps reduce cross-site tracking in web browsers?
Disabling the firewall
Accepting all cookie prompts
Using public Wi-Fi
Enabling private browsing or regularly clearing cookies
Private browsing modes and clearing cookies prevent trackers from accumulating data across sessions. Disabling security features or accepting all cookies increases exposure to tracking.
A website's privacy policy states it shares data with third-party analytics services. Which setting should you adjust to limit this?
Two-factor authentication settings
Data sharing or app permission settings
Post visibility settings
Ad blocker preferences
Modifying data sharing or app permissions can restrict which third parties have access to your information. Two-factor authentication and post visibility do not control backend data transfers.
Which vulnerability allows attackers to inject malicious scripts into trusted websites viewed by other users?
Man-in-the-middle attack
Password spraying
Phishing
Cross-site scripting (XSS)
Cross-site scripting exploits insecure web page code to insert and execute malicious scripts in users' browsers. Other attack types involve credentials or intercepting communications rather than code injection.
What differentiates spear phishing from a general phishing attack?
It is a form of ransomware
It only occurs on social media platforms
It always uses telephone calls instead of email
It targets a specific individual or organization with personalized information
Spear phishing crafts messages specifically tailored to a target, often using personal or organizational details, increasing effectiveness. General phishing casts a wide net without customization.
What is credential stuffing, and how can you defend against it?
Using default passwords on devices; defend by changing default passwords
Automated use of stolen credentials on multiple sites; defend by using unique passwords and multi-factor authentication
Testing multiple passwords manually; defend by locking accounts
Sending deceptive emails for credentials; defend by training users
Credential stuffing involves automated attempts using leaked username-password pairs across various services. Unique passwords and multi-factor authentication prevent attackers from reusing credentials on different sites.
What is vishing, and what is an effective way to protect yourself from it?
Video phishing through fake streaming sites; install video blockers
SMS phishing via text messages; delete all texts
Voice-based phishing over phone calls; verify caller identity before sharing personal information
Physical theft of voice data; use voice encryptors
Vishing uses phone calls to trick individuals into revealing sensitive information. Confirming the caller's authenticity before disclosing any details helps mitigate this risk.
0
{"name":"Which of the following is a common sign of a phishing email?", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Which of the following is a common sign of a phishing email?, Which of the following is considered a strong password?, Which action is unsafe when using public Wi-Fi?","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}

Learning Outcomes

  1. Identify common online threats and safety vulnerabilities.
  2. Evaluate secure practices for protecting personal information.
  3. Apply strategies to recognize and avoid phishing scams.
  4. Demonstrate safe browsing habits across different devices.
  5. Analyse privacy settings and enhance social media security.
  6. Master responsible digital communication and password management.

Cheat Sheet

  1. Recognize Common Online Threats - Fun but crucial: phishing scams, malware, and crafty social engineering tactics all want to nab your personal info! Spotting these digital baddies early turns you into a cybersecurity ninja. Protecting Yourself Against Phishing
  2. HBS.edu resource
  3. Evaluate Secure Practices for Personal Information - Before you share your secrets, double-check who's asking and if their channel is locked down tight. Strong, unique passwords and multi-factor authentication give hackers a serious headache. Phishing Tips
  4. Ole Miss IT Security
  5. Apply Strategies to Recognize and Avoid Phishing Scams - Watch for urgent emails begging for clicks, sketchy senders, or weird URLs hiding behind friendly text. Hover over links like a detective to peek at the real address before you click! Tips and Strategies
  6. IU Phishing Tips
  7. Demonstrate Safe Browsing Habits Across Devices - Keep your browser and operating system updated so they can block the latest cyber-villains, and use trusted antivirus software to keep your shields up. Avoid dubious websites and clear your history and cookies regularly to stay stealthy. Phishing Tips Highlight
  8. Binghamton University
  9. Analyze Privacy Settings and Enhance Social Media Security - Tweak your profile settings like a privacy pro: decide who sees what and keep unwanted eyes out. The less personal info you share publicly, the harder it is for identity thieves to strike. Avoid Being a Phishing Victim
  10. CU Security
  11. Master Responsible Digital Communication and Password Management - Use a password manager to create and guard strong, unique passwords for every account - no repeats allowed! And always communicate respectfully online to keep your digital footprint squeaky clean. Phishing Tips
  12. MSU SecureIT
  13. Understand the Importance of Software Updates - Think of updates as power-ups: they patch security holes and keep you one step ahead of cyber-villains. Enable automatic updates and let your devices level up on their own. Phishing Tips Highlight
  14. Binghamton University
  15. Recognize the Signs of a Secure Website - A legit site flaunts HTTPS and a little padlock icon - your green light to share sensitive data. If the certificate seems fishy or missing, hit the brakes and back out. Phishing Tips
  16. MSU SecureIT
  17. Be Cautious with Email Attachments and Links - Attachments and links from strangers can be Trojan horses; don't open or click until you're sure who sent them. When in doubt, verify the sender through another channel. Don't Get Phished
  18. University of Miami Security
  19. Report Suspicious Activities - Spotted a phishy email or sketchy link? Be a cyber hero and report it to your IT squad or the authorities. Quick action helps protect everyone from digital disasters. Avoid Being a Phishing Victim
  20. CU Security
Powered by: Quiz Maker