Technology & IT Skills
Online safety quiz questions to check your digital habits
This quiz helps you check your online safety skills, from phishing to privacy and safe browsing. Want a specific focus? Try an online safety quiz for kids, strengthen your social profiles with a social media safety quiz, or learn about harassment risks in a cyberbullying quiz.
Take the Quiz
1Which of the following is a common sign of a phishing email?
2Which of the following is considered a strong password?
3Which action is unsafe when using public Wi-Fi?
4What is the primary purpose of two-factor authentication (2FA)?
5Which privacy setting best restricts social media post visibility to only your friends?
6Which type of software is specifically designed to record keystrokes on a computer?
7Which indicator shows that a website is secured with HTTPS?
8Seeing a URL spelled 'www.paypall.com' instead of 'www.paypal.com' is an example of what?
9What setting adjustment helps limit who can view your social media posts?
10What is the main advantage of using a VPN on public networks?
11Which practice helps secure personal data on mobile devices?
12How should you handle an unexpected email attachment from an unknown sender?
13Which method is the most secure for managing unique passwords for multiple accounts?
14Before entering sensitive information online, what should you always verify?
15Which action helps reduce cross-site tracking in web browsers?
16A website's privacy policy states it shares data with third-party analytics services. Which setting should you adjust to limit this?
17Which vulnerability allows attackers to inject malicious scripts into trusted websites viewed by other users?
18What differentiates spear phishing from a general phishing attack?
19What is credential stuffing, and how can you defend against it?
20What is vishing, and what is an effective way to protect yourself from it?
Learning Goals
Learning Outcomes
- Identify common online threats and safety vulnerabilities.
- Evaluate secure practices for protecting personal information.
- Apply strategies to recognize and avoid phishing scams.
- Demonstrate safe browsing habits across different devices.
- Analyse privacy settings and enhance social media security.
- Master responsible digital communication and password management.
Study Guide
Cheat Sheet
- Recognize Common Online Threats - Fun but crucial: phishing scams, malware, and crafty social engineering tactics all want to nab your personal info! Spotting these digital baddies early turns you into a cybersecurity ninja. Protecting Yourself Against Phishing HBS.edu resource
- Evaluate Secure Practices for Personal Information - Before you share your secrets, double-check who's asking and if their channel is locked down tight. Strong, unique passwords and multi-factor authentication give hackers a serious headache. Phishing Tips Ole Miss IT Security
- Apply Strategies to Recognize and Avoid Phishing Scams - Watch for urgent emails begging for clicks, sketchy senders, or weird URLs hiding behind friendly text. Hover over links like a detective to peek at the real address before you click! Tips and Strategies IU Phishing Tips
- Demonstrate Safe Browsing Habits Across Devices - Keep your browser and operating system updated so they can block the latest cyber-villains, and use trusted antivirus software to keep your shields up. Avoid dubious websites and clear your history and cookies regularly to stay stealthy. Phishing Tips Highlight Binghamton University
- Analyze Privacy Settings and Enhance Social Media Security - Tweak your profile settings like a privacy pro: decide who sees what and keep unwanted eyes out. The less personal info you share publicly, the harder it is for identity thieves to strike. Avoid Being a Phishing Victim CU Security
- Master Responsible Digital Communication and Password Management - Use a password manager to create and guard strong, unique passwords for every account - no repeats allowed! And always communicate respectfully online to keep your digital footprint squeaky clean. Phishing Tips MSU SecureIT
- Understand the Importance of Software Updates - Think of updates as power-ups: they patch security holes and keep you one step ahead of cyber-villains. Enable automatic updates and let your devices level up on their own. Phishing Tips Highlight Binghamton University
- Recognize the Signs of a Secure Website - A legit site flaunts HTTPS and a little padlock icon - your green light to share sensitive data. If the certificate seems fishy or missing, hit the brakes and back out. Phishing Tips MSU SecureIT
- Be Cautious with Email Attachments and Links - Attachments and links from strangers can be Trojan horses; don't open or click until you're sure who sent them. When in doubt, verify the sender through another channel. Don't Get Phished University of Miami Security
- Report Suspicious Activities - Spotted a phishy email or sketchy link? Be a cyber hero and report it to your IT squad or the authorities. Quick action helps protect everyone from digital disasters. Avoid Being a Phishing Victim CU Security
Explore More
Technology Quizzes
AI-DraftedHuman-Reviewed
Reviewed by
Updated Feb 23, 2026