Let's check about your cyber security knowledge

Welcome to your Genaral awareness

1. 
What is the primary goal of data protection?

2. 
How can individuals protect their personal data online?

3. 
What is personally identifiable information (PII)?

4. 
What is the first step individuals should take to enhance their data privacy?

5. 
Why should individuals be cautious about oversharing personal information on public Wi-Fi networks?

Welcome to your phishing

1. 
What is phishing?

2. 
How can individuals recognize a phishing email?

3. 
What is the primary goal of a phishing attack?

4. 
How does spear phishing differ from regular phishing?

5. 
What should individuals do if they receive an unexpected email attachment?

Welcome to your phone-based attack

1. 
What does a virtual private network (VPN) do for mobile devices?

2. 
Why is regularly backing up data on a mobile device important?

3. 
What is the primary purpose of two-factor authentication (2FA) on mobile devices?

4. 
How can users protect their data from shoulder surfing attacks in public spaces?

5. 
What is the primary purpose of locking and password-protecting mobile devices?

Welcome to your impersonation and pretexting

1. 
What is the primary goal of impersonation in cyber-security?

2. 
Which type of information is commonly targeted in impersonation attacks?

3. 
Why is role-based access control crucial for data protection against impersonation?

4. 
What is the purpose of regularly updating and patching software in data protection?

5. 
How does incident response planning contribute to data protection against pretexting?

Welcome to your Online and Offline Safety

1. 
How can individuals protect their personal information during online transactions?

2. 
What is the role of geotagging in compromising offline safety?

3. 
Why is it crucial to review and understand the privacy policies of online platforms?

4. 
What role does encryption play in ensuring the confidentiality of online communication?

5. 
What should individuals do if they suspect they have fallen victim to identity theft?

Welcome to your social media trends

1. 
What is social engineering?

2. 
How do attackers use pretexting in social engineering attacks?

3. 
How is AI integrated into social engineering attacks?

4. 
Q: How have social engineering tactics adapted during the COVID-19 pandemic?

5. 
Q: What is the importance of user awareness in preventing social engineering attacks?

Welcome to your Educating others

1. 
1. Why is educating others on data protection important in the digital age?

2. 
How does knowledge about data protection empower individuals?

3. 
What role does education play in building a culture of responsibility regarding data protection?

4. 
How can understanding the risks associated with online activities positively impact individual habits?

5. 
In what ways does educating others contribute to mitigating cyber-security threats?

Welcome to your Reducing Vulnerabilities

1. 
How does encryption contribute to data protection?

2. 
What does the principle of least privilege aim to achieve in access control?

3. 
What is the purpose of regular backups in reducing vulnerabilities?

4. 
How does the zero-trust security model approach user access?

5. 
What is the role of SIEM systems in vulnerability reduction?

Welcome to your Recognising Manipulative Tactics

1. 
What is the primary purpose of social engineering in the context of manipulative tactics?

2. 
Manipulating individuals for personal gain How do phishing attacks typically operate?

3. 
What is the term for malicious software that compromises data integrity?

4. 
What is a common sign of a potential social engineering attack in a workplace setting?

5. 
How can organizations mitigate the risk of phishing attacks?