/10 Pre-Session Quiz 1 / 10 What should you do if you receive a suspicious email that asks for your personal information? Forward the email to your friends Delete the email without opening any attachments or clicking any links Reply with the requested information Save the email for future reference 2 / 10 Which of the following is a safe practice when using social media? Clicking on every link shared by friends Sharing your home address and phone number publicly Accepting friend requests from strangers Regularly updating your privacy settings and being cautious about what you share 3 / 10 Which of the following actions can help protect your personal information online? Using strong, unique passwords for different accounts Using public Wi-Fi for online banking Sharing your passwords with friends Clicking on links in unsolicited emails 4 / 10 What should you do if you suspect you are a victim of cybercrime? Report it to the nearest police station or cybercrime cell Ignore it and hope it goes away Share your experience on social media without reporting it Try to handle it yourself without professional help 5 / 10 Which of the following is considered a cybercrime? Posting vacation photos on social media None of the above Hacking into someone’s computer without permission Sending a birthday message to a friend 6 / 10 Which government body in India deals with cybercrime? Indian Computer Emergency Response Team (CERT-In) Reserve Bank of India(RBI) Indian Railways Ministry of Health and Family Welfare 7 / 10 What is ransomware? A social media platform An online game A type of software that speeds up your computer Malware that encrypts a victim’s files and demands payment for the decryption key 8 / 10 What is a common sign that your computer might be infected with malware? Your computer becomes unusually slow, and you see frequent pop-up ads You receive a high number of spam emails Your computer starts up very quickly Your internet connection speeds up dramatically 9 / 10 What is phishing? Attempting to acquire sensitive information by pretending to be a trustworthy entity Sending someone a link to a funny video Uploading files to cloud storage Playing online games with strangers 10 / 10 Which of the following is an example of identity theft? Stealing someone’s personal information to commit fraud Using someone else’s Wi-Fi without permission Copying homework from a friend Downloading movies illegally Your score is 0% Restart quiz
Pre-Session Quiz
1 / 10
What should you do if you receive a suspicious email that asks for your personal information?
2 / 10
Which of the following is a safe practice when using social media?
3 / 10
Which of the following actions can help protect your personal information online?
4 / 10
What should you do if you suspect you are a victim of cybercrime?
5 / 10
Which of the following is considered a cybercrime?
6 / 10
Which government body in India deals with cybercrime?
7 / 10
What is ransomware?
8 / 10
What is a common sign that your computer might be infected with malware?
9 / 10
What is phishing?
10 / 10
Which of the following is an example of identity theft?
Your score is
Restart quiz
Post-Session Quiz 1 / 10 What is a major risk of downloading APK files from untrusted sources? Exposure to malware and viruses that can compromise your device Access to exclusive features not available in official versions Improved app performance Faster updates than official app stores 2 / 10 If you detect an unauthorized transaction on your account, what should your first step be? Wait for your next bank statement to verify the transaction Withdraw all funds from your account to prevent further theft Notify your bank immediately and change all your online banking passwords Contact the merchant directly to dispute the charge 3 / 10 Which practice helps reduce your digital footprint effectively? Regularly clearing browser cookies and history Using a VPN for all online activities Avoiding all online transactions and interactions Posting only on private social media accounts 4 / 10 What should you do if you receive an email claiming you have won a lottery and need to provide personal details to claim the prize? Share the news with your friends on social media Delete the email and do not respond Immediately provide the requested information to claim your prize Reply asking for more details about the lottery 5 / 10 What is a safe practice to ensure your personal information is protected when using online services? Sharing your passwords with close friends and family for backup Storing your passwords in a text file on your computer Using the same password for all your accounts to remember them easily Regularly updating your passwords and using two-factor authentication 6 / 10 Investment fraud can often be identified by which of the following characteristics? Detailed financial statements and public listings Endorsements by well-known celebrities Investment opportunities in established companies like Apple or Google Guaranteed high returns with little to no risk 7 / 10 In a FedEx fraud scam, what is a common red flag? Receiving a tracking number and delivery date Being asked to pay customs fees or provide personal information via email or phone Getting a package you didn’t order but from a familiar sender Notification of a package held at a FedEx office due to incomplete address 8 / 10 To report a cybercrime in India, which of the following is the most direct method? Filing a complaint through a consumer rights website Reporting it on social media platforms like Facebook or Twitter Sending an email to your local police station Calling the national cybercrime helpline 1930 or visiting cybercrime.gov.in 9 / 10 Cybercrime.gov.in primarily serves what purpose? Listing the most wanted cybercriminals in India Facilitating the reporting and tracking of cybercrimes by the public Offering cybersecurity training programs Providing free antivirus software to citizens 10 / 10 Which of the following is NOT a risk associated with an extensive digital footprint? Accidental sharing of confidential personal information Higher visibility to potential employers Greater exposure to targeted phishing attacks Increased chances of identity theft Your score isThe average score is 60% 0% Restart quiz
Post-Session Quiz
What is a major risk of downloading APK files from untrusted sources?
If you detect an unauthorized transaction on your account, what should your first step be?
Which practice helps reduce your digital footprint effectively?
What should you do if you receive an email claiming you have won a lottery and need to provide personal details to claim the prize?
What is a safe practice to ensure your personal information is protected when using online services?
Investment fraud can often be identified by which of the following characteristics?
In a FedEx fraud scam, what is a common red flag?
To report a cybercrime in India, which of the following is the most direct method?
Cybercrime.gov.in primarily serves what purpose?
Which of the following is NOT a risk associated with an extensive digital footprint?
The average score is 60%