Skip to content
TaskVA

Time Left:
00
:
00
:
00
HRS
 
MIN
 
SEC
Time Spent: %%TIMESPENT%%
Time expired. Sorry, you will not be able to continue with this quiz. Please opt-in to see the result.
SEC
HRS
MIN
SEC
SEC
Total Time
0
HRS
0
MIN
0
SEC
How CyberSmart Are You?
1
Insert Video
Is your cyber world secure? Take this quiz and see how well you fare.
START THE QUIZ
... ... ... ... ... ... ... ... ... ... ... ... ... ... ...
1%
Public Wi-Fi networks that require an access password are safe to use for sensitive activities such as online banking.
1
Insert Video
Enter any additional information about the quiz
True
A text area will be displayed in the frontend when users select this answer.
Add RecommendationAdd Tags
False
A text area will be displayed in the frontend when users select this answer.
Add RecommendationAdd Tags
Next
Which of the following is an example of a "phishing" attack?
1
Insert Video
Enter any additional information about the quiz
All of the above
A text area will be displayed in the frontend when users select this answer.
Add RecommendationAdd Tags
Creating a fake website that looks nearly identical to a real website in order to trick users into entering their login information
A text area will be displayed in the frontend when users select this answer.
Add RecommendationAdd Tags
Sending someone a text message that contains a malicious link that is disguised to look like a notification that the person has won a contest
A text area will be displayed in the frontend when users select this answer.
Add RecommendationAdd Tags
Sending someone an email that contains a malicious link that is disguised to look like an email from someone the person knows
A text area will be displayed in the frontend when users select this answer.
Add RecommendationAdd Tags
Next
What is the best way to secure a weak password like "monkey123"?
1
Insert Video
Enter any additional information about the quiz
None of the above
A text area will be displayed in the frontend when users select this answer.
Add RecommendationAdd Tags
Enable two-factor authentication
A text area will be displayed in the frontend when users select this answer.
Add RecommendationAdd Tags
Add an uppercase character and a special character, such as $
A text area will be displayed in the frontend when users select this answer.
Add RecommendationAdd Tags
Don't reuse it anywhere else, or share with anyone
A text area will be displayed in the frontend when users select this answer.
Add RecommendationAdd Tags
Next
Can Internet service providers see your online activities when you are using private browsing/incognito windows?
1
Insert Video
Enter any additional information about the quiz
No
A text area will be displayed in the frontend when users select this answer.
Add RecommendationAdd Tags
Yes
A text area will be displayed in the frontend when users select this answer.
Add RecommendationAdd Tags
Next
Turning off the GPS function of your smartphone prevents any location tracking.
1
Insert Video
Enter any additional information about the quiz
False
A text area will be displayed in the frontend when users select this answer.
Add RecommendationAdd Tags
True
A text area will be displayed in the frontend when users select this answer.
Add RecommendationAdd Tags
Next
A group of computers that is networked together and used by hackers to steal information is called a …
1
Insert Video
Enter any additional information about the quiz
Operating System
A text area will be displayed in the frontend when users select this answer.
Add RecommendationAdd Tags
DDoS
A text area will be displayed in the frontend when users select this answer.
Add RecommendationAdd Tags
Botnet
A text area will be displayed in the frontend when users select this answer.
Add RecommendationAdd Tags
Rootkit
A text area will be displayed in the frontend when users select this answer.
Add RecommendationAdd Tags
Next
What is the weakest link in cybersecurity?
1
Insert Video
Enter any additional information about the quiz
Short passwords
A text area will be displayed in the frontend when users select this answer.
Add RecommendationAdd Tags
Weak encryption
A text area will be displayed in the frontend when users select this answer.
Add RecommendationAdd Tags
Humans
A text area will be displayed in the frontend when users select this answer.
Add RecommendationAdd Tags
Next

 Which Organization is the most vulnerable to hacking?

1
Insert Video
Enter any additional information about the quiz
Charitable organizations with weak cybersecurity
A text area will be displayed in the frontend when users select this answer.
Add RecommendationAdd Tags
Black market websites with strong cybersecurity
A text area will be displayed in the frontend when users select this answer.
Add RecommendationAdd Tags
School or Government websites
A text area will be displayed in the frontend when users select this answer.
Add RecommendationAdd Tags
Next
What does "HTTPS://" mean as opposed to "HTTP://"?
1
Insert Video
Enter any additional information about the quiz
The site is not accessible to specific computers
A text area will be displayed in the frontend when users select this answer.
Add RecommendationAdd Tags
The site has superior high definition
A text area will be displayed in the frontend when users select this answer.
Add RecommendationAdd Tags
None of the above
A text area will be displayed in the frontend when users select this answer.
Add RecommendationAdd Tags
The site is secure, and your information is encrypted
A text area will be displayed in the frontend when users select this answer.
Add RecommendationAdd Tags
The site is the newest version available
A text area will be displayed in the frontend when users select this answer.
Add RecommendationAdd Tags
Next
The best way to minimize your digital footprint is to:
1
Insert Video
Enter any additional information about the quiz
Take fewer pictures with your smartphone
A text area will be displayed in the frontend when users select this answer.
Add RecommendationAdd Tags
Travel less with your smartphone
A text area will be displayed in the frontend when users select this answer.
Add RecommendationAdd Tags
Post less on social media
A text area will be displayed in the frontend when users select this answer.
Add RecommendationAdd Tags
Both A and B
A text area will be displayed in the frontend when users select this answer.
Add RecommendationAdd Tags
None of the above
A text area will be displayed in the frontend when users select this answer.
Add RecommendationAdd Tags
Next
%%QUESTIONANSWERS%%
Skip Opt-in
Insert Video
Almost there...

Tell us where to send your results
Send My Results

Your privacy is protected, and your email address will only be used by TASK Virtual Assistant to communicate with you. You can cancel your subscription at any time.

If you don't see your results in your inbox, please check your spam folder.

.
Preparing Report...
Please wait... we are calculating your results
* Do not leave the page or reload the page *
You got %%CORRECTANSWERS%% correct out of %%TOTALQUESTIONS%%
1
Insert Video

Confused about keeping your online environment and home office network safe?


Click "LEARN MORE" below, after reviewing your answers, and find out how to take control of your network and keep your business safe from Internet Bad Guys!


LEARN MORE
%%CATEGORY_TOTAL_PERCENT%%
%%CATEGORY_TOTAL_NUMBER%%
[CATEGORY_TOTAL_PERCENT]
[CATEGORY_ONLY_PERCENT]
[CATEGORY_TOTAL_NUMBER]
Retake

YOUR TOTAL POINTS
0

Congrats! You have earned 0 point(s) by completing this quiz.

Follow Us:

Get In Touch

  • Info@thetaskva.com
  • 12007 15th Avenue | PO Box 564211 College Point, NY 11356-4211

Important Links

  • Who We Are
  • About Company
  • Services We Provide
  • Privacy Policy

Phishing is one of the most common ways attackers gain access to business systems and sensitive information.

A phishing attempt usually arrives as an email that appears legitimate. It may look like it comes from a bank, software provider, shipping company, or even a coworker. The message often creates a sense of urgency—asking you to click a link, confirm account details, or download an attachment.

Once the link is clicked or the attachment is opened, the attacker may capture login credentials, install malicious software, or redirect the user to a fake login page designed to steal passwords.

Because phishing emails are designed to look convincing, even experienced professionals can be caught off guard. This is why awareness and training are such important parts of cybersecurity.

➡ Want to learn how to spot a phishing email? Read this: Vishing, Phishing, and Smishing

Passwords remain one of the most common security vulnerabilities in small businesses.

Many people reuse the same password across multiple websites or choose passwords that are easy to remember. Unfortunately, this also makes them easier for attackers to guess or crack using automated tools.

If one compromised website exposes a password, attackers will often try that same password across many other services—including email accounts, cloud storage, and financial platforms.

Using unique, complex passwords and enabling multi-factor authentication dramatically reduces this risk.

Ransomware is a type of malicious software that blocks access to files or systems until a payment is made to the attacker.

Once installed on a computer or network, ransomware can encrypt important business documents, customer data, or financial records. Victims are typically presented with a message demanding payment to restore access.

Even if the ransom is paid, there is no guarantee the attacker will actually unlock the files. For many small businesses, the downtime and recovery costs can be more damaging than the ransom itself.

Maintaining secure backups is one of the most effective defenses against ransomware.

➡ Want to learn how to protect your business? Read this: Ransomware Reality Check

Public Wi-Fi networks—such as those in coffee shops, hotels, and airports—can expose business data if proper precautions aren’t taken.

Unsecured networks may allow attackers to intercept data transmitted between a device and the internet. This could include login credentials, emails, or other sensitive information.

For business owners and remote workers, it’s important to avoid accessing sensitive accounts on public networks whenever possible or to use a secure VPN connection.

➡ Want to learn how to keep your devices safe? Read this: Travel Smart

Terms and Conditions - Privacy Policy