Step 1 of 11 - Introduction 9% How much do you know about cybersecurity? Test your knowledge on cybersecurity topics and terms by taking our 10-question quiz. Then see how you did in comparison with a nationally representative group of 1,055 randomly selected adult internet users surveyed online between June 17 and June 27, 2016. The survey was conducted by the GfK Group using KnowledgePanel. When you finish, you will be able to compare your scores with the average American and see explanations for the terms and topics in each question. The analysis of the findings from the poll can be found in the full report, "What the Public Knows About Cybersecurity." Take the quiz and share your results with us on Twitter @PewInternet. What does the “https://” at the beginning of a URL denote, as opposed to "http://" (without the “s”)?That the site has special high definitionThat information entered into the site is encryptedThat the site is the newest version availableThat the site is not accessible to certain computersNone of the aboveNot sure Which of the following is an example of a “phishing” attack?Sending someone an email that contains a malicious link that is disguised to look like an email from someone the person knowsCreating a fake website that looks nearly identical to a real website in order to trick users into entering their login informationSending someone a text message that contains a malicious link that is disguised to look like a notification that the person has won a contestAll of the aboveNot sure A group of computers that is networked together and used by hackers to steal information is called a …BotnetRootkitDDoSOperating systemNot sure Some websites and online services use a security process called two-step authentication. Which of the following images is an example of two-step authentication?1234None of theseNot sure Which of the following four passwords is the most secure?Boat123WTh!5Zinto*48123456Not sure Criminals access someone’s computer and encrypt the user’s personal files and data. The user is unable to access this data unless they pay the criminals to decrypt the files. This practice is called …BotnetRansomwareDrivingSpamNone of the aboveNot sure “Private browsing” is a feature in many internet browsers that lets users access web pages without any information (like browsing history) being stored by the browser. Can internet service providers see the online activities of their subscribers when those subscribers are using private browsing?YesNoNot sure Turning off the GPS function of your smartphone prevents any tracking of your phone’s location.TrueFalseNot sure If a public Wi-Fi network (such as in an airport or café) requires a password to access, is it generally safe to use that network for sensitive activities such as online banking?Yes, it is safeNo, it is not safeNot sure What kind of cybersecurity risks can be minimized by using a Virtual Private Network (VPN)?Use of insecure Wi-Fi networksKey-loggingDe-anonymization by network operatorsPhishing attacksNot sure