How Cyber Savvy Are You? Take Our Cybersecurity Quiz and Find Out

Westmire Wired (1)

October is Cyber Security Awareness Month. At SolidTrust Pay, we want to help you, our valued members and merchants, be more secure online by staying informed and knowing the simple steps you can take right now to protect yourself, your families, your workplaces and the devices you rely on every day.

It’s believed that by the year 2021, cybercrime will cost $6 trillion annually, making it more profitable than the global trade of illicit drugs. In 2018, nearly a quarter of Americans (23%) reported that they or someone in their household fell victim to a cybercrime attack. The figures are almost identical in Europe, with major studies in the UK, France and Spain revealing that just over 25% of respondents have been a victim of computer crime. Today, you are 20 times more likely to have money stolen from you by a criminal living in another country through the internet than by being robbed in the street.

You may think that cybersecurity is a challenge to be solved by the government, financial institutions and corporations, but the truth is that cybersecurity is a shared responsibility and there are many simple steps that you can take to protect yourself. If you would like to learn which 10 Internet Safety Rules You Should Never Break, please click the link.

To test your cybersecurity knowledge, we have adapted a short 10 question quiz from the Pew Research Center. If you score above 6 correct responses, congratulations, you’re well on your way to being a savvy online user. Scores below 6 indicate that you could benefit from improving your cybersecurity knowledge. Answers to the quiz can be found at the bottom of this post.

Cybersecurity Quiz

Question 1

What does the “https:” at the beginning of a URL denote, as opposed to “http:” (without the “s”)?

  1. That the site has special high definition
  2. That information entered into the site is encrypted
  3. That the site is the newest version available
  4. That the site is not accessible to certain computers
  5. None of the above

Question 2

Which of the following is an example of a “phishing” attack?

  1. Sending someone an email that contains a malicious link that is disguised to look like an email from someone the person knows
  2. Creating a fake website that looks nearly identical to a real website in order to trick users into entering their login information
  3. Sending someone a text message that contains a malicious link that is disguised to look like a notification that the person has won a contest
  4. All of the above
  5. None of the above

Question 3

A group of computers that is networked together and used by hackers to steal information is called a:

  1. Botnet
  2. Rootkit
  3. DDoS
  4. Operating system
  5. None of the above

Question 4

Which of the following four passwords is the most secure?

  1. Boat123
  2. WTh!5Z
  3. into*48
  4. 123456
  5. None of the above

Question 5

Criminals access someone’s computer and encrypt the user’s personal files and data. The user is unable to access this data unless they pay the criminals to decrypt the files. This practice is called:

  1. Botnet
  2. Ransomware
  3. Driving
  4. Spam
  5. None of the above

Question 6

“Private browsing” is a feature in many internet browsers that lets users access web pages without any information (like browsing history) being stored by the browser. Can internet service providers see the online activities of their subscribers when those subscribers are using private browsing?

  1. Yes
  2. No

Question 7

Turning off the GPS function of your smartphone prevents any tracking of your phone’s location.

  1. True
  2. False

Question 8

If a public Wi-Fi network (such as in an airport or café) requires a password to access, is it generally safe to use that network for sensitive activities such as online banking?

  1. Yes, it is safe
  2. No, it is not safe

Question 9

What kind of cybersecurity risks can be minimized by using a Virtual Private Network (VPN)?

  1. Use of insecure Wi-Fi networks
  2. Key-logging
  3. De-anonymization by network operators
  4. Phishing attacks
  5. All of the above

Question 10

When browsing online, a new window pops up stating that a virus has been found on your computer. The window provides a button to click offering to resolve the issue. Your best course of action is to:

  1. Click on the button to remove the virus
  2. Place your cursor over the button and check the link’s website address (URL). If the address looks legitimate, click on it. If it looks like a scam link, close the window
  3. Close the original browser window and the new “pop-up” window. Do not return to the site
  4. Hit the back button and see if it goes away
  5. None of the above


We Will Never Compromise Your Security

At SolidTrust Pay, protecting your privacy is our top priority. Our corporate-grade anti-virus and firewall protection is continuously monitored by our network of global security personnel. We are PCI compliant and use 256-bit SSL certificates to keep your data safe and secure. Unlike other e-wallet providers and payment processors, we have instituted a dual password system to better safeguard your personal and financial information. We require that all passwords be routinely updated and they must adhere to strict parameters. In addition, all SolidTrust Pay transactions require a secondary password, a TrustCard code or a Two-Factor Authentication (2FA) text message as an added security measure.

By requiring a secondary password for all payments and transfers sent from your e-wallet, we adopted Two-Factor Authentication (2FA) security protocols before they became best practice. We are continually striving to remain one step ahead of cybercriminals and cyberthreats, a mandate that guides our Corporate Philosophy. When you choose SolidTrust Pay for your payment processing needs, you’re getting more than a convenient and secure e-wallet – you’ll enjoy complete peace of mind knowing that your personal and financial information is securely stored, encrypted and only accessible by you.

SolidTrust Pay Logo

If you enjoyed this post, please subscribe to our Blog and follow us on Facebook and Twitter.

Quiz Answers:

Question 1 = 2 (That information entered into the site is encrypted)
Question 2 = 4 (All of the above)
Question 3 = 1 (Botnet)
Question 4 = 2 (WTh!5Z)
Question 5 = 2 (Ransomware)
Question 6 = 1 (Yes)
Question 7 = 2 (False)
Question 8 = 3 (No, it is not safe)
Question 9 = 1 (Use of insecure Wi-Fi networks)
Question 10 = 3 (Close the original browser window and the “pop-up” window. Do not return to the site)

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s