Discover Your Cybersecurity Potential with the FREE Cyber Aptitude Test! Steps to Begin Your Aptitude Test : Enter your information below to kick off the quiz. Finish the 20-question challenge within 10 minutes. Check your email after submitting for confirmation and results. Welcome to Cyber Aptitude Test Note: Please fill out the form below to begin the test. Name Email Phone Your Profession (Student or Working Professional) What is two-factor authentication? A security method requiring two forms of verification Using two separate Wi-Fi networks Using two computers for one account Writing your password twice None In a recent case, fraudsters posed as telecom representatives, urging victims to download remote-access apps to “improve connectivity.” What’s the key lesson for preventing similar scams? Use multi-factor authentication Install the latest antivirus Regularly change Wi-Fi passwords Never grant app permissions without verification None What is encryption? A process that converts data into a code to prevent unauthorized access A type of password generator A Wi-Fi signal booster A way to make text look stylish None What is phishing? Tricking people into sharing sensitive information by pretending to be a trustworthy source Searching online for information A type of bug A gaming term None An online shopping platform experienced a data breach through SQL Injection. Which primary security flaw likely allowed the breach? Lack of input validation Inadequate firewall protection Weak password policies Poor network segmentation None Which of the following is a good password practice? Using a combination of letters, numbers, and symbols Sharing passwords with friends Writing down passwords on paper Using 'password123' None If your computer is behaving strangely and slowing down, what might be the cause? A poor internet connection A dusty keyboard A virus or malware infection Too many icons on your desktop None A hacker intercepts login sessions on unsecured public Wi-Fi to steal credentials. Which type of attack is this? Session Hijacking Denial of Service Spoofing IP Spoofing None What is a firewall? A type of data storage device A file-sharing app A wall that protects buildings from fire A network security system that monitors and controls incoming and outgoing traffic None A retired official was recently scammed by fraudsters posing as law enforcement, asking for money to “clear his name.” What tactic is being used here? Pretexting Baiting Scareware Phishing None What is malware? Software that helps improve computer speed A setting to improve display quality Harmful software designed to damage or gain unauthorized access A type of computer hardware None A tech graduate leads a cybercrime ring targeting job seekers by impersonating government officials and asking for personal details. What vulnerability are they exploiting? Social Engineering Buffer Overflow SQL Injection IDS Evasion None An AI tool used in cybersecurity flags patterns but struggles with new attacks. What’s the best approach to keep it effective? Depend solely on AI monitoring Regularly update it with new threat data Use it only on old threats Turn it off during peak hours None What is cybersecurity? Backing up data regularly Buying antivirus software Protecting computers and networks from theft and damage Learning to code None AI is often used to predict and prevent phishing attacks. Which feature of AI enables it to differentiate between legitimate and fake emails effectively? Biometric Analysis URL Shortening Pattern Recognition Data Compression None Which of these devices could be a target for hackers? Any device connected to the internet, like phones, tablets, and smart TVs Just old computers Only desktop computers Only government-owned devices None Fraudsters use a fake website that resembles a legitimate travel booking platform to trap users. What initial security check can users perform to verify website authenticity? Use the website’s contact form Check for an HTTPS URL and site certificates Enter details as a test Contact customer support to verify None Which of the following is a proactive approach for analyzing cyber threats based on past incidents, like the ones reported in recent fraud cases? Threat Intelligence Vulnerability Analysis SQL Injection IoT Hacking None A telecom fraud involves fake app installations. Which step can users take to ensure downloaded apps are legitimate? Always download apps from official app stores Check the app’s name only Disable phone lock for easy access Rely on links from messages None Why is it important to keep your software updated? Updates often fix security issues and bugs It uses less memory It changes the design It makes your computer look cooler None 1 out of 2