Results

Congratulations, you did well! You know your way around the internet and how to stay safe. There is always room for more learning, and keeping up to date is important so keep at it!

Unfortunately, you didn’t pass the test. I recommend going back and reading through the information provided on this website, as it will aid you in staying safer while traversing the digital world. And don’t worry—there is a lot to look out for, but it is crucial to have a basic understanding of what to look out for. Keep at it!

#1. What action should you take if you suspect an email is a phishing attempt?

#2. How can you determine if a link in an email is legitimate without clicking on it? (all lower case letters)

The correct answer is

hover your cursor over the link

If you wrote something similar, you were correct.

#3. Analyse the provided picture of an email and figure out if it is REAL or FAKE (Right-click the image and click Open Image in New Tab to analyse it)

This is just a comercial email that is advertising for PodBean. Going thorugh the checlist of what to look for we see:
Sender address: service@podbean.com which is a legit email address for podbean.

The content: The language and sentence structure seems to be good.

Link: There are quite alot of links, this can be expected from some comercial emails that is trying to sell you their product.

#4. What should you do if you receive an email requesting sensitive information or login credentials?

#5. Why is using the same password across multiple accounts considered risky?

Select all that apply:

The correct answers are

If one account is compromised, all linked accounts become vulnerable. If one account becomes compromised, meaning someone knows your login credentials, and you use the same login everywhere, it’s easy for the person who has your information to log in to other accounts as well.

It improves account accessibility. It improves account accessibility not only for you but for malicious actors as well.

#6. Why is it important to avoid writing down passwords on physical or digital notes?

#7. What are the potential consequences of neglecting to read and understand social media terms of service agreements?

#8. What risks are associated with downloading files from untrusted sources on the Internet?

#9. What is a common tactic used in phishing emails to prompt quick action?

#10. What is the purpose of reporting fraudulent websites?

#11. What precautions should you take when using removable media devices like USB drives?

#12. How can you ensure the safety of sensitive documents before leaving or disposing of them?

Select all that apply:

The correct answers are

Store them in a safe place

Shred or destroy them

Storing sensitive documents in locked drawers or other secure places makes it harder for people to access the information. The same applies to disposing of sensitive documents; if they are destroyed before being thrown away, others can’t recover the information.

#13. What is the purpose of encryption?

Select all that apply:

The correct answers are

Safeguarding sensitive information from unauthorised access.

Enabling secure communication between devices and servers.

If the data is encrypted, others who are trying to listen in to the conversation between the devices will not be able to understand the content of the information that is sendt

#14. What role does encryption play in safeguarding data privacy and security during online transactions?

Select all that apply:

The correct answers are

Scrambling data into an unreadable format. As showcased in the “Mobile Device Use” section with the video example. Encryption makes the messages sent between your device and the target device(websites and such) unreadable.

 

Protecting against unauthorised access. Using the examples provided in the section, it’s like sending a secret message in a locked box—only the intended recipient possesses the key to unlock it. This means others cannot open the box and gain access to its content.

Finish