Cyber Safety & Cyberbullying Cyber Safety & Cyberbullying 1 / 25 1) How can two-factor authentication help protect your online accounts? a) By making your password easier to guess b) By automatically sharing your password with friends c) By requiring a code in addition to your password to access your account d) By requiring only a password to access your account 2 / 25 2) How can promoting digital citizenship help prevent cyberbullying? a) By encouraging negative behavior online b) By understanding the impact of our words and actions online c) By ignoring the feelings of others d) By spreading harmful content 3 / 25 3) What is the primary goal of a phishing scam? a) To trick people into giving away their personal information b) To entertain people c) To provide helpful information d) To help people find new friends 4 / 25 4) What is one way to address cyberbullying if you or someone you know is experiencing it? a) Respond to the bully b) Don't respond to the bully c) Encourage the bully d) Share the bullying with others 5 / 25 5) Which of these is a good practice for protecting your personal information online? a) Using strong, unique passwords for each account b) Sharing your home address on social media c) Using the same password for all accounts d) Connecting to public Wi-Fi for online banking 6 / 25 6) Why is it important to use strong passwords? a) To make it easy for friends to access your accounts b) To protect your accounts from hackers and cybercriminals c) To avoid using special characters d) To make it easy to remember 7 / 25 7) What is one way to support someone experiencing cyberbullying? a) Join the bully b) Ignore them c) Be a friend and offer support d) Spread rumors about them 8 / 25 8) What should you do with evidence of cyberbullying? a) Save the evidence b) Delete it immediately c) Share it with your friends d) Ignore it 9 / 25 9) What can you do on social media platforms to report cyberbullying? a) Ignore the bullying content b) Share the bullying content c) Use the reporting features d) Like the bullying content 10 / 25 10) What is the best way to respond to a cyberbully? a) Encourage their behavior b) Retaliate with insults c) Join the bullying d) Don't respond to the bully 11 / 25 11) What should you do if you witness cyberbullying? a) Report the content to the platform b) Encourage the bullying c) Like, share, or comment on harmful content d) Ignore the content 12 / 25 12) Why should you avoid accessing sensitive information on public Wi-Fi networks? a) Public Wi-Fi networks are usually faster b) Public Wi-Fi networks are more secure than private networks c) Public Wi-Fi networks can be less secure, and your information can be intercepted d) Public Wi-Fi networks require a password 13 / 25 13) Why is it important to keep your software up to date? a) To make your device slower b) To use more storage space c) To protect your device from online threats d) To get the latest features 14 / 25 14) How can a password manager help you maintain online security? a) By creating weak passwords for your accounts b) By providing public Wi-Fi passwords c) By securely storing all of your passwords in one place d) By allowing you to use the same password for all accounts 15 / 25 15) What should you avoid sharing on social media to protect your personal information? a) Your home address and phone number b) Pictures of your pets c) Your favorite movies d) Your favorite hobbies 16 / 25 16) Which of these is an example of cyberbullying? a) Liking a friend's post on social media b) Sending anonymous threatening messages c) Congratulating someone on their achievements d) Complimenting someone on their photo 17 / 25 17) Who should you talk to if you are experiencing cyberbullying? a) A trusted adult b) Nobody c) The bully d) Strangers online 18 / 25 18) What is the role of bystanders in combating cyberbullying? a) To spread the bullying content b) To participate in the bullying c) To help address and prevent cyberbullying d) To ignore the situation 19 / 25 19) What is the goal of promoting digital citizenship and empathy? a) To help people become famous on social media b) To create a more respectful and inclusive online environment c) To encourage negative behavior online d) To encourage cyberbullying 20 / 25 20) What is a common sign that an email or message might be a phishing scam? a) The message contains misspellings or unusual grammar b) The message is from a trusted contact c) The message has no links or attachments d) The message is only text 21 / 25 21) How can you check if a website is secure when entering personal information? a) Check if the website has many ads b) Look for a padlock symbol in the address bar and https in the website address c) See if the website has a lot of images d) Look for a high number of visitors 22 / 25 22) What is the main purpose of cyber safety? a) To become popular on social media b) To access public Wi-Fi c) To create complex passwords d) To stay safe and secure when using the internet and digital technologies 23 / 25 23) What should you do if you receive a suspicious email asking for personal information? a) Provide the requested information b) Download any attachments c) Avoid clicking on links and report the phishing attempt d) Click on any links in the email 24 / 25 24) What is a passphrase? a) A series of special characters b) A single word c) A longer sequence of words that is easy to remember but hard to guess d) A sequence of numbers 25 / 25 25) How can you prevent a cyberbully from contacting you further? a) Block the bully b) Respond to their messages c) Add them as a friend on social media d) Encourage their behavior Your score is Restart quiz