/10 Pre-Session Quiz 1 / 10 Which of the following is an example of identity theft? Downloading movies illegally Stealing someone’s personal information to commit fraud Copying homework from a friend Using someone else’s Wi-Fi without permission 2 / 10 Which of the following is considered a cybercrime? Hacking into someone’s computer without permission Posting vacation photos on social media None of the above Sending a birthday message to a friend 3 / 10 What is ransomware? A type of software that speeds up your computer A social media platform An online game Malware that encrypts a victim’s files and demands payment for the decryption key 4 / 10 Which of the following is a safe practice when using social media? Sharing your home address and phone number publicly Accepting friend requests from strangers Regularly updating your privacy settings and being cautious about what you share Clicking on every link shared by friends 5 / 10 What is phishing? Uploading files to cloud storage Playing online games with strangers Sending someone a link to a funny video Attempting to acquire sensitive information by pretending to be a trustworthy entity 6 / 10 What should you do if you receive a suspicious email that asks for your personal information? Save the email for future reference Reply with the requested information Forward the email to your friends Delete the email without opening any attachments or clicking any links 7 / 10 What is a common sign that your computer might be infected with malware? Your computer becomes unusually slow, and you see frequent pop-up ads Your computer starts up very quickly You receive a high number of spam emails Your internet connection speeds up dramatically 8 / 10 What should you do if you suspect you are a victim of cybercrime? Report it to the nearest police station or cybercrime cell Share your experience on social media without reporting it Ignore it and hope it goes away Try to handle it yourself without professional help 9 / 10 Which of the following actions can help protect your personal information online? Using strong, unique passwords for different accounts Using public Wi-Fi for online banking Clicking on links in unsolicited emails Sharing your passwords with friends 10 / 10 Which government body in India deals with cybercrime? Indian Computer Emergency Response Team (CERT-In) Indian Railways Reserve Bank of India(RBI) Ministry of Health and Family Welfare Your score is 0% Restart quiz
Pre-Session Quiz
1 / 10
Which of the following is an example of identity theft?
2 / 10
Which of the following is considered a cybercrime?
3 / 10
What is ransomware?
4 / 10
Which of the following is a safe practice when using social media?
5 / 10
What is phishing?
6 / 10
What should you do if you receive a suspicious email that asks for your personal information?
7 / 10
What is a common sign that your computer might be infected with malware?
8 / 10
What should you do if you suspect you are a victim of cybercrime?
9 / 10
Which of the following actions can help protect your personal information online?
10 / 10
Which government body in India deals with cybercrime?
Your score is
Restart quiz
Post-Session Quiz 1 / 10 Investment fraud can often be identified by which of the following characteristics? Investment opportunities in established companies like Apple or Google Endorsements by well-known celebrities Guaranteed high returns with little to no risk Detailed financial statements and public listings 2 / 10 Which practice helps reduce your digital footprint effectively? Using a VPN for all online activities Posting only on private social media accounts Avoiding all online transactions and interactions Regularly clearing browser cookies and history 3 / 10 In a FedEx fraud scam, what is a common red flag? Getting a package you didn’t order but from a familiar sender Notification of a package held at a FedEx office due to incomplete address Receiving a tracking number and delivery date Being asked to pay customs fees or provide personal information via email or phone 4 / 10 To report a cybercrime in India, which of the following is the most direct method? Reporting it on social media platforms like Facebook or Twitter Calling the national cybercrime helpline 1930 or visiting cybercrime.gov.in Sending an email to your local police station Filing a complaint through a consumer rights website 5 / 10 What should you do if you receive an email claiming you have won a lottery and need to provide personal details to claim the prize? Delete the email and do not respond Immediately provide the requested information to claim your prize Reply asking for more details about the lottery Share the news with your friends on social media 6 / 10 Cybercrime.gov.in primarily serves what purpose? Offering cybersecurity training programs Listing the most wanted cybercriminals in India Providing free antivirus software to citizens Facilitating the reporting and tracking of cybercrimes by the public 7 / 10 What is a major risk of downloading APK files from untrusted sources? Faster updates than official app stores Improved app performance Exposure to malware and viruses that can compromise your device Access to exclusive features not available in official versions 8 / 10 What is a safe practice to ensure your personal information is protected when using online services? Using the same password for all your accounts to remember them easily Storing your passwords in a text file on your computer Sharing your passwords with close friends and family for backup Regularly updating your passwords and using two-factor authentication 9 / 10 Which of the following is NOT a risk associated with an extensive digital footprint? Higher visibility to potential employers Greater exposure to targeted phishing attacks Accidental sharing of confidential personal information Increased chances of identity theft 10 / 10 If you detect an unauthorized transaction on your account, what should your first step be? Contact the merchant directly to dispute the charge Notify your bank immediately and change all your online banking passwords Withdraw all funds from your account to prevent further theft Wait for your next bank statement to verify the transaction Your score isThe average score is 66% 0% Restart quiz
Post-Session Quiz
Investment fraud can often be identified by which of the following characteristics?
Which practice helps reduce your digital footprint effectively?
In a FedEx fraud scam, what is a common red flag?
To report a cybercrime in India, which of the following is the most direct method?
What should you do if you receive an email claiming you have won a lottery and need to provide personal details to claim the prize?
Cybercrime.gov.in primarily serves what purpose?
What is a major risk of downloading APK files from untrusted sources?
What is a safe practice to ensure your personal information is protected when using online services?
Which of the following is NOT a risk associated with an extensive digital footprint?
If you detect an unauthorized transaction on your account, what should your first step be?
The average score is 66%