Cybersecurity Quiz

Download as pdf or txt
Download as pdf or txt
You are on page 1of 35

Cybersecurity Pop Quiz

The Cybersecurity Pop Quiz


is a special free resource
intended for remote / home
office workers during the
Coronavirus outbreak.

24 questions that everybody from the


mailroom to the boardroom should be
able to answer.

All rights reserved Cybersecurity Ventures © 2020


Cybersecurity Pop Quiz

Introduction
Many of you have been sent home during the Coronavirus
outbreak. In response, Cybercrime Magazine has published
this Cybersecurity Pop Quiz for remote workers.

24 multiple-choice questions will test your knowledge of


cybercrime and cybersecurity, at a time when cybercriminal
activity may rise sharply and target you and your employer.

Read and answer the questions. Then go to the answer key


on page 25 and grade yourself.

The quiz is authored by Scott Schober, chief security officer


at Cybersecurity Ventures, and author of the book
Cybersecurity Is Everybody's Business.

We encourage all organizations globally to share this free


quiz with your work-at-home employees.

All rights reserved Cybersecurity Ventures © 2020


Cybersecurity Pop Quiz

1. What is the simplest way to stop


brute-force cyberattacks dead in their
tracks?

A. Shred all paperwork containing


sensitive information.

B. Add a deadbolt lock to all entryways.

C. Add a few unique characters to any


password or PIN

(Answer Key is provided on page 25)

1 All rights reserved Cybersecurity Ventures © 2020


Cybersecurity Pop Quiz

2. What’s the quickest way to stop a


suspected app, device, or OS from spying
on you?

A. Google user reports of that device’s


spying activity and what those people did to
stop it.

B. Log out of the suspected device or


account and go about your day.

C. Visit Consumer Affairs or the Federal


Trade Commission website for tips.

2 All rights reserved Cybersecurity Ventures © 2020


Cybersecurity Pop Quiz

3. What is the weakest link in


cybersecurity?

A. Weak encryption.

B. Humans.

C. Short passwords.

3 All rights reserved Cybersecurity Ventures © 2020


Cybersecurity Pop Quiz

4. What is the first thing you should do if


your company is facing ransomware
demands?

A. Determine if ransomware demand is


legitimate and follow instructions to get
your data back.

B. Ignore the demands, but back up all data


just in case.

C. Contact the police and do not pay the


ransom.

4 All rights reserved Cybersecurity Ventures © 2020


Cybersecurity Pop Quiz

5. Which one of these things will a


comprehensive cyber insurance NOT
protect you from?

A. Poor cybersecurity hygiene and


implementation.

B. A ransomware attack on your company’s


computer network.

C. An employee skimming/stealing
customers’ credit cards.

5 All rights reserved Cybersecurity Ventures © 2020


Cybersecurity Pop Quiz

6. What’s the best way to secure a weak


password like “monkey123”?

A. Add an uppercase numeral and a special


character, such as $.

B. Don’t reuse it anywhere else or share it


with anyone.

C. Enable two-factor authentication.

6 All rights reserved Cybersecurity Ventures © 2020


Cybersecurity Pop Quiz

7. When using a VPN, what’s the one thing


that you cannot hide from ISPs, hackers,
and the government?

A. The fact that you’re using a VPN.

B. Your identity.

C. Your data.

7 All rights reserved Cybersecurity Ventures © 2020


Cybersecurity Pop Quiz

8. The best way to minimize your digital


footprint is to:

A. Take fewer photos with your


smartphone.

B. Travel less with your smartphone.

C. Post less on social media.

8 All rights reserved Cybersecurity Ventures © 2020


Cybersecurity Pop Quiz

9. What is most valuable to companies


looking to sell you something?

A. Your phone number.

B. Your email address.

C. Your physical address.

9 All rights reserved Cybersecurity Ventures © 2020


Cybersecurity Pop Quiz

10. What’s the best way to deal with pesky


robocalls?

A. Ask to speak with their supervisor.

B. Use a carrier-approved smartphone app.

C. Register your phone number to the do-


not-call list.

10 All rights reserved Cybersecurity Ventures © 2020


Cybersecurity Pop Quiz

11. Which organization is the most


vulnerable to hacking?

A. Charitable organizations with weak


cybersecurity.

B. Black market websites with strong


cybersecurity.

C. Your business.

11 All rights reserved Cybersecurity Ventures © 2020


Cybersecurity Pop Quiz

12. When is it ok to reuse a password?

A. When you are logging into social media


accounts.

B. When it is too hard to remember a long


password.

C. Never.

12 All rights reserved Cybersecurity Ventures © 2020


Cybersecurity Pop Quiz

13. What should you do if you think your


identity or accounts have been
compromised?

A. Monitor your email address and accounts


for fraudulent activity.

B. Respond to the warning email you have


received.

C. Subscribe to a monitoring service such as


Lifelock or WebWatcher.

13 All rights reserved Cybersecurity Ventures © 2020


Cybersecurity Pop Quiz

14. The best defense against ransomware


is being proactive when you:

A. Purchase comprehensive cybersecurity


insurance.

B. Back up your data regularly.

C. Regularly update all your devices and


software with the latest security patches.

14 All rights reserved Cybersecurity Ventures © 2020


Cybersecurity Pop Quiz

15. What’s the best way to steer clear of


IoT device security hacks?

A. Only choose name-brand hardware


makers.

B. Disconnect IoT devices from the internet


when you are not using them.

C. Do not purchase any IoT devices you do


not need.

15 All rights reserved Cybersecurity Ventures © 2020


Cybersecurity Pop Quiz

16. What will freezing your credit not


affect?

A. Vulnerability to identity theft.

B. Your credit score.

C. Need to monitor financial statements for


fraud.

16 All rights reserved Cybersecurity Ventures © 2020


Cybersecurity Pop Quiz

17. Which ride-sharing service collects the


least amount of your data?

A. Uber.

B. Lyft.

C. Public taxi service.

17 All rights reserved Cybersecurity Ventures © 2020


Cybersecurity Pop Quiz

18. What is the best way to keep


employees from falling for phishing scams?

A. Email filters that block suspicious


attachments.

B. Cybersecurity awareness training.

C. Pop-up blockers.

18 All rights reserved Cybersecurity Ventures © 2020


Cybersecurity Pop Quiz

19. What is the best way to maintain


privacy between two parties?

A. Long and strong passwords and two-


factor authentication.

B. Encrypted cloud services.

C. End-to-end encryption.

19 All rights reserved Cybersecurity Ventures © 2020


Cybersecurity Pop Quiz

20. Which of the following cryptocurrency


statements is false?

A. Blockchain is the digital ledger that


records all cryptocurrency transactions.

B. Each new Bitcoin mined requires slightly


more energy than the previous one.

C. Cryptocurrency is 100 times more secure


than traditional currency.

20 All rights reserved Cybersecurity Ventures © 2020


Cybersecurity Pop Quiz

21. If you see a suspicious or dangerous


drone flying near you, you should:

A. Call the police.

B. Shoot it out of the sky.

C. Call the FAA.

21 All rights reserved Cybersecurity Ventures © 2020


Cybersecurity Pop Quiz

22. Which part of your car is the most


vulnerable to hacking?

A. Cruise control.

B. Entertainment system.

C. Wireless key fob.

22 All rights reserved Cybersecurity Ventures © 2020


Cybersecurity Pop Quiz

23. Which one of these statements is


false?

A. Tokenized transactions are more secure


than credit cards.

B. Card skimmers can be hidden inside


ATMs.

C. Bluetooth skimmers are detected by


using smartphones.

23 All rights reserved Cybersecurity Ventures © 2020


Cybersecurity Pop Quiz

24. Which one of these things is most


effective for maintaining your digital
privacy?

A. Unsubscribing from all spam emails.

B. Covering your computer’s front-facing


camera.

C. Not sharing personal information on


social media.

24 All rights reserved Cybersecurity Ventures © 2020


Cybersecurity Pop Quiz

Answer Key
1. What is the simplest way to stop brute-force cyberattacks
dead in their tracks?
C. Add a few unique characters to any password or PIN.

2. What’s the quickest way to stop a suspected app, device,


or OS from spying on you?
B. Log out of the suspected device or account and go about
your day.

3. What is the weakest link in cybersecurity?


B. Humans

4. What is the first thing you should do if your company is


facing ransomware demands?
C. Contact the police and do not pay the ransom.

25 All rights reserved Cybersecurity Ventures © 2020


Cybersecurity Pop Quiz

Answer Key
5. Which one of these things will a comprehensive cyber
insurance NOT protect you from?
A. Poor cybersecurity hygiene and implementation.

6. What’s the best way to secure a weak password like


“monkey123”?
C. Enable two-factor authentication.

7. When using a VPN, what’s the one thing that you cannot
hide from ISPs, hackers, and the government?
A. The fact that you’re using a VPN.

8. The best way to minimize your digital footprint is to:


C. Post less on social media.

26 All rights reserved Cybersecurity Ventures © 2020


Cybersecurity Pop Quiz

Answer Key
9. What is most valuable to companies looking to sell you
something?
A. Your phone number.

10. What’s the best way to deal with pesky robocalls?


B. Use a carrier-approved smartphone app.

11. Which organization is the most vulnerable to hacking?


A. Charitable organizations with weak cybersecurity.

12. When is it ok to reuse a password?


C. Never.

27 All rights reserved Cybersecurity Ventures © 2020


Cybersecurity Pop Quiz

Answer Key
13. What should you do if you think your identity or accounts
have been compromised?
A. Monitor your email address and accounts for fraudulent
activity.

14. The best defense against ransomware is being


proactive when you:
B. Back up your data regularly.

15. What’s the best way to steer clear of IoT device security
hacks?
C. Do not purchase any IoT devices you do not need.

16. What will freezing your credit not affect?


B. Your credit score.

28 All rights reserved Cybersecurity Ventures © 2020


Cybersecurity Pop Quiz

Answer Key
17. Which ride-sharing service collects the least amount of
your data?
C. Public taxi service.

18. What is the best way to keep employees from falling for
phishing scams?
B. Cybersecurity awareness training.

19. What is the best way to maintain privacy between two


parties?
C. End-to-end encryption.

20. Which of the following cryptocurrency statements is


false?
C. Cryptocurrency is 100 times more secure than
traditional currency.

29 All rights reserved Cybersecurity Ventures © 2020


Cybersecurity Pop Quiz

Answer Key
21. If you see a suspicious or dangerous drone flying near
you, you should:
A. Call the police.

22. Which part of your car is the most vulnerable to


hacking?
B. Entertainment system.

23. Which one of these statements is false?


C. Bluetooth skimmers are detected by using
smartphones.

24. Which one of these things is most effective for


maintaining your digital privacy?
C. Not sharing personal information on social media.

30 All rights reserved Cybersecurity Ventures © 2020


Cybersecurity Pop Quiz

Recommended Reading
Since publication of his first book, HACKED AGAIN, Scott
Schober has dedicated himself to educating anyone who
would listen by telling his own story of being hacked in the
hope that others can learn from his own mistakes.

In his second book, CYBERSECURITY IS EVERYBODY'S


BUSINESS, joined by his brother Craig, the two have set
their sights on the biggest target of all, small businesses.
There are 30 million small businesses currently operating in
the United States. Some of them are single owner/operated
while others collectively employ hundreds of millions. This
book is for all of them and anyone who makes it their
business to stay safe from phishing attacks, malware spying,
ransomware, identity theft, major breaches and hackers
who would compromise their security.

Scott Schober is a cybersecurity expert, author, inventor,


and media commentator. He generously devotes his time to
Cybersecurity Ventures as our chief security officer.

All rights reserved Cybersecurity Ventures © 2020


Cybersecurity Pop Quiz

Cybersecurity Ventures
Cybersecurity Ventures is the world’s leading researcher
and Page ONE for the global cyber economy, and a trusted
source for cybersecurity facts, figures, and statistics.

We provide cyber economic market data, insights, and


ground-breaking predictions to a global audience of CIOs
and IT executives, CSOs and CISOs, information security
practitioners, cybersecurity company founders and CEOs,
venture capitalists, corporate investors, business and
finance executives, HR professionals, and government
cyber defense leaders.

All of our content is free. We do our own ground-up


research and writing (and some periodic contributions) —
plus we vet, synthesize and repurpose research from
credible sources (analysts, researchers, vendors, industry
experts, media publishers) — and there’s no ‘pay-to-play’ on
our lists or ‘advertorial’ in our reports.

All rights reserved Cybersecurity Ventures © 2020


Cybersecurity Pop Quiz

Cybercrime Magazine

Cybercrime Magazine publishes annual and quarterly


reports covering global cybercrime, cyberwarfare, hacks
and data breaches, cybersecurity market forecasts and
spending predictions, publicly traded cybersecurity
companies and stock performance, M&A and VC funding
activity, cyber defense employment, and more.

We keep our audience on the cutting edge of cyber


with video journalism, featuring interviews with industry
celebrities, thought leaders, and market movers, and
our Cybercrime Radio podcast channel.

Cybersecurity Ventures and Cybercrime Magazine have


offices in Sausalito, Calif. and Northport, N.Y.

All rights reserved Cybersecurity Ventures © 2020

You might also like