Page 14 - MIL Syllabus and Lesson Plans
P. 14

c) Forward it to all your contacts
                      d) Click on any links provided in the email
                  10. What is a common method used by cybercriminals to steal sensitive information?
                      a) Social engineering
                      b) Sharing files through cloud storage
                      c) Using encrypted connections
                      d) Installing antivirus software
                  11. What is the purpose of a strong firewall?
                      a) To block unwanted websites
                      b) To speed up internet connectivity
                      c) To protect against unauthorized access
                      d) To enhance online gaming performance
                  12. Which of the following is an example of appropriate online behavior?
                      a) Posting mean comments about someone on social media
                      b) Engaging in respectful discussions on forums
                      c) Creating multiple fake accounts for online gaming
                      d) Sharing explicit content without consent
                  13. What does the term "phishing" refer to?
                      a) Creating fake social media profiles
                      b) Stealing personal information through email or websites
                      c) Using virtual reality for gaming
                      d) Posting positive reviews for products
                  14. Which of the following is an example of two-factor authentication?
                      a) Using a strong password
                      b) Logging in with a username and password
                      c) Scanning a fingerprint and entering a PIN
                      d) Sharing login credentials with a trusted friend
                  15. Why is it important to critically evaluate online information?
                      a) To avoid online advertisements
                      b) To protect against malware attacks
                      c) To identify fake news and misinformation
                      d) To increase social media followers
                  16. What is the purpose of a digital detox?
                      a) To improve internet connectivity
                      b) To limit the use of electronic devices
                      c) To permanently delete online accounts
                      d) To download and install software updates
                  17. Which of the following is an example of online etiquette?
                      a) Posting offensive comments on social media
                      b) Sharing personal information with strangers
                      c) Using proper language and tone in online communication
                      d) Hiding your identity while interacting online
                  18. What is the concept of "netiquette"?
                      a) Rules for driving on the internet
                      b) Proper behavior on the World Wide Web
                      c) Protecting against online viruses
                      d) Speeding up internet connections
                  19. What is the purpose of a digital rights and responsibilities agreement?


                                                                                                         2
   9   10   11   12   13   14   15   16   17   18   19