If You Get 19/35 of These Cyber Security Questions Right, You're Probably Not a Complete Idiot Online

TECH

By: Heather Cahill

6 Min Quiz

Image: shutterstock

About This Quiz

Safety first, when you go online! Each day, it gets harder and harder to keep yourself protected when browsing online. There is always a new piece of technology that can make your data so much harder to protect. However, there are many methods you can use to help yourself. They may be tedious, like security questions or simple like two-factor authentication, but they're all useful tools. So, you think you know how to stay safe online?

Do you know about the different types of hackers and why they hack? What about the techniques they use to hack individuals or companies? Do you know what qualifies as hacking? So you know all of those, but do you know what a keylogger does? The world of hacking can be complicated!

Do you know how to protect yourself online? Do you know what a firewall does to protect you? How do you create a strong, perfectly crafted password? What about how to protect yourself from malware? It's all important stuff to know when protecting yourself on the net!

So, if you're the IT expert in your family or the tech-savvy one in your friend group, what are you waiting for? Take the quiz to see how safe you really are when you're on the web!

What should a strong password contain?

A strong password usually contains numbers along with special characters that are not in a sequence that is easy to guess. Things like birthdays, phone numbers or other numbers that are important in your life are probably not a good idea to use as passwords.

Advertisement

If you receive an email that looks suspicious, what should you do?

If you receive an email that looks suspicious or malicious, delete it without opening it. If it claims to be from a company that you know and trust, you could first contact that company through their website - not by replying to the email in order to verify its validity.

Advertisement

What is used to stop malicious attempts at logging into an online account?

Security questions are a common way to help keep your account safe, as they ask information that others would typically not know about you. These can include things like the first street you lived on or your kindergarten teacher's name.

Advertisement

What is a grey hat hacker?

Grey hat hackers do good, but they are commonly individuals who sell something to a larger organization. For example, they may find something wrong with a program, and sell the information on the vulnerability back to the company so that they can fix it.

Advertisement

Is it true or false that someone can hack through Bluetooth?

This is true. Bluetooth is just as susceptible to being hacked as Wifi is. It can lead to the same security problems as hacking over wifi, such as malware and spying.

Advertisement

What is a direct access attack?

A direct access attack is typically an attack that is done physically and in person by the hacker. This means that they can go to the computer and take information from it or gain access to other things through it, as well as install malicious software onto it.

Advertisement

Which of the following can also be a form of hacking?

Eavesdropping can also be a form of hacking, as it involves connecting into a line to listen to a conversation. This is a breach of privacy that can be quite dangerous.

Advertisement

What should you do if you receive an unexpected payment from someone in the form of an email?

If you receive an unexpected payment in the form of an email from a company, you should first report it to that company. They can verify if it is legitimate or if it is likely fraud. Do not click any links or buttons within the email, as it can be very dangerous if it is in fact fraud.

Advertisement

What is two-factor authentication?

Two-factor authentication is a security process that protects online accounts even further than a username and password. It typically includes a code that no one except the account holder knows.

Advertisement

Is it true or false that mobile phones can be hacked?

This is true. Cell phones are vulnerable to being hacked, not only by tapping into your phones calls, but through other means as well. Hackers are able to hijack your phone and remotely access all of your photos, texts and other information, as well as take control.

Advertisement

What does the "P" in "VPN" stand for?

The acronym VPN stands for Virtual Private Network. This is used to provide extra security when browsing the internet by connecting to a larger network in another place. The larger network is typically more secure than the user's network.

Advertisement

What is malware?

Malware is, quite literally, malicious software, as it is intended to do harm to your computer. There are many types of malware, including spyware, adware and trojans.

Advertisement

What does a drive lock protect?

A drive lock is used to protect hard drives from hackers, using a password. Unless you have the password to the hard drive, you would not be able to access any of its files.

Advertisement

What is a white hat hacker?

An ethical hacker is also called a white hat hacker. These hackers are not malicious - they work for companies to improve their security and protect their users. They do it for the greater good, rather than for personal or financial gain.

Advertisement

What term is used to describe attacks at opposing computer systems?

Cyberwarfare is the term used for this, as it is a type of technological battle between systems. This typically takes place on a very large scale, as countries themselves battle it out against each other online.

Advertisement

What is pinging used for?

Pinging is the process of checking a connection to a computer. In order to verify the connection after the ping is sent out, a reply is sent from the network or device to confirm its connection.

Advertisement

What was one of the most infectious and costly computer viruses, first seen in 2004?

MyDoom was a large virus that entered Windows computers through emails. The first bout of it took place in 2004, and has since returned a few times.

Advertisement

Is it true or false that small businesses are safe from cyber attacks?

This is false. Small business are just as vulnerable to attacks as anyone else. Many times, small businesses don't have an IT person to keep watch over their systems. This can lead to trouble if they're ever infected with a virus.

Advertisement

What does a security analyst do?

A security analyst looks for problems or issues that arise in the area of cybersecurity. Large companies often hire them to perform tests on their systems to make sure that everything is as safe as possible.

Advertisement

What term is used to describe hacking for a social cause?

"Hacktivism" is a term used when hacking for social change. Often, this type of hacking is done for greater good, but it can still be a dangerous practice for the participants.

Advertisement

What is often sold to inexperienced individuals to hack systems?

Hackers will often sell exploit kits to individuals who are inexperienced at hacking. Such kits come packed with viruses to infect the computer.

Advertisement

Is it true or false that you can get malware from clicking ads?

This is true. What may appear to be a safe, harmless ad on the side of a page can in fact spread malware to your computer. This can even happen if the ad is not clicked, making it that much more effective to spread to many users.

Advertisement

What does a firewall do?

A firewall monitors traffic and blocks anything that it finds suspicious. Firewalls can be an important tool to prevent hackers from accessing your computer and files, although it may not be all you need to stop them completely.

Advertisement

What is the internet of things?

The internet of things is a term for anything in the world that uses technology. This can include the cell phones we carry with us daily to the cars that we use to get from place to place, to our appliances. As long as they use internet, they qualify.

Advertisement

Attacks on corporations are usually done to receive what?

Large corporations and online retailers typically have a massive customer base that uses credit cards to make purchases. Many attacks on these companies are done to receive this customer information and credit card data for their own gain.

Advertisement

Is it true or false that large corporations now hire IT professionals to keep their data secure?

This is true. In today's age, almost everything uses technology. This means that it is extra important that companies hire a team of trained professionals to keep everything safe, internally and externally.

Advertisement

What is clickjacking?

Clickjacking is the practice of making someone believe they are clicking on something legitimate, when they are in fact clicking on an invisible, malicious link. This can spread malware easily to many people.

Advertisement

What is the purpose of a key logger?

Key loggers are used to record anything that is typed into a person's keyboard. This can even be done by a workplace. Commonly, key loggers are used by hackers to steal information such as passwords or banking information.

Advertisement

What should you do regularly to ensure your computer is clean?

Doing a security scan regularly can decrease the chance of your computer getting a virus. The scan will detect the virus and do what it can to eliminate it and keep your data safe.

Advertisement

Which of the following may seem safe, but has a possibility of spreading viruses?

Apps that you can download from the app store seem so harmless and fun. But if they aren't from a trusted source, there is a chance that they can also infect your phone or computer. To be on the safe side, it is better to only download apps from trusted developers.

Advertisement

What can minimize your risk of getting a virus?

Viruses are very easy to get, but to minimize that risk, only visit trusted websites that you know. Malicious websites can send viruses to your computer without your knowledge, making the attacks hard to recognize and eliminate.

Advertisement

Which of the following is not a way that your computer can get a virus?

Your computer won't pick up a virus from the game "Minesweeper" that is often found on Windows computers! This came pre-installed, so there is no reason to worry - it came right from Microsoft.

Advertisement

Other than email, what other form of communication can hold a virus?

Sometimes, spam texts pop up in our messages. These usually contain a link or direction in order to get us to do something. These links can infect cell phones and should not be clicked on. However, you can report these messages to your carrier.

Advertisement

Is it true or false that even medical devices can be hacked?

This is true. Many different brands of electronic medical devices have been proven vulnerable to hackers. This is an extreme threat to the well-being and life of the people who use these devices to live everyday.

Advertisement

What can help to prevent viruses from infecting your computer?

Installing anti-virus software is the first step into keeping your computer safe from malicious software and viruses. There are also a few other ways, like using strong passwords and keeping your personal information safe.

Advertisement

Explore More Quizzes

About HowStuffWorks Play

How much do you know about dinosaurs? What is an octane rating? And how do you use a proper noun? Lucky for you, HowStuffWorks Play is here to help. Our award-winning website offers reliable, easy-to-understand explanations about how the world works. From fun quizzes that bring joy to your day, to compelling photography and fascinating lists, HowStuffWorks Play offers something for everyone. Sometimes we explain how stuff works, other times, we ask you, but we’re always exploring in the name of fun! Because learning is fun, so stick with us!