Title Page

  • Conducted on

  • Prepared by

  • Location

Cyber-Safety Inspection

  • What is cyber crime ?

  • It is ok to cyberbully, even if you are kidding around ?

  • Can you trust anyone and everyone online?

  • Which of the following are examples of threats you may encounter online? Select all that apply.

  • ________ are messages that try to trick you into providing sensitive information?

  • Which of the following passwords is the strongest?

  • True or False: Clicking ads and pop-ups could expose your computer to malware?

  • When shopping online, which payment method is generally safest?

  • What is a browser cookie?

  • To see if a website is using a secure connection, what should you look for? Select all that apply

  • What is the purpose of an IP Address?

  • The full form of IP in IP Address is ______.

  • You should use VPN to protect your IP Addess

  • Never use anti-virus and firwall

  • What does the “https://” at the beginning of a URL denote, as opposed to "http://" (without the “s”)?

  • A group of computers that is networked together and used by hackers to steal information is called a

  • Is free or public wifi safe for banking

  • What kind of cybersecurity risks can be minimized by using a Virtual Private Network (VPN)?

The templates available in our Public Library have been created by our customers and employees to help get you started using SafetyCulture's solutions. The templates are intended to be used as hypothetical examples only and should not be used as a substitute for professional advice. You should seek your own professional advice to determine if the use of a template is permissible in your workplace or jurisdiction. You should independently determine whether the template is suitable for your circumstances.