Sei sulla pagina 1di 4

2/23/2018 Cybersecurity Knowledge Quiz | Pew Research Center

NUMBERS, FACTS AND TRENDS SHAPING YOUR WORLD ABOUT FOLLOW MY ACCOUNT  DONATE

Internet & Technology
MENU RESEARCH AREAS ARCH

You answered 8 of 10 questions correctly.

ee elow how our reult compare with the 1,055 randoml ampled adult that took part in our national urve and
review how ou reponded to each quetion. For more finding from the urve, read "What the Pulic Know Aout
Cerecurit." (http://www.pewinternet.org/2017/03/22/what-the-pulic-know-aout-cerecurit/)

You scored better than 91% of the public, below 4% of the public
and the same as 5%.
16% 16%

15%

12%

11%

<7% 7% 7%

5%

3%

1%

0 1 2 3 4 5 6 7 8 9 10

T O TA L N U M B E R O F Q U E S T I O N S A N S W E R E D C O R R E C T LY

These percentages only reflect the 1,055 adults who took part in the national survey; online quiz results are not included in the sample.

Your responses and demographic breakdowns


% of adult anwering Read More
...

http://www.pewinternet.org/quiz/cybersecurity-knowledge/ 1/4
2/23/2018 Cybersecurity Knowledge Quiz | Pew Research Center

% of adult anwering Read More
...

What doe the “http://” at the
eginning of a URL denote, a ncrpting information entered into a
oppoed to "http://" (without the weite make it far more difficult for anone
Correctl: 75% 
“”)?  other than the uer and weite owner to
Incorrectl: 8% 
  read the information. A of Feruar 2017,
Not ure: 17%
You correctl anwered That around half of all internet traffic i now
information entered into the site encrpted.
is encrypted

Which of the following i an Phihing attack attempt to get a uer to
example of a “phihing” attack?  Correctl: 73%  click on a maliciou link or file 
  Incorrectl: 7%  imperonating a truted ource the uer i
You correctl anwered All of the Not ure: 20% familiar with. All three of the choice lited
above are example of a phihing attack.

A rootkit i a tpe of maliciou oftware
A group of computer that i
deigned to gain unauthorized acce to a
networked together and ued  Correctl: 54% 
computer tem. DDo tand for
hacker to teal information i Incorrectl:
Ditriuted Denial of ervice, it i an attack
called a …  21% 
where large amount of requet are ent to
  Not ure: 24%
a we erver in order to overwhelm the
You correctl anwered Botnet
erver and hut it down.

ome weite and online ervice
ue a ecurit proce called two- Thi i the onl example of two-tep
tep authentication. Which of the authentication lited – true two-tep
following image i an example of authentication require the uer to enter a
two-tep authentication?  Correctl: 51%  one-time code each time the log in to their
  Incorrectl: account, in addition to their regular
You correctl anwered  22%  uername and paword. While the other
1 Not ure: 26% anwer ma require uer to perform two
eparate operation to gain acce to a ite,
the are not example of two-tep
authentication.

Thi paword contain the aic element
of a trong paword recommended 
expert. It contain a comination of letter,
Which of the following four numer and mol; it include oth upper
Correctl: 48% 
paword i the mot ecure?  and lower cae letter; and it doe not
Incorrectl: 9% 
  contain an word from the dictionar. For
Not ure: 43%
You correctl anwered WTh!5Z more information on creating trong
paword, ee:
http://www.wired.com/2016/05/paword-
tip-expert/

http://www.pewinternet.org/quiz/cybersecurity-knowledge/ 2/4
2/23/2018 Cybersecurity Knowledge Quiz | Pew Research Center

% of adult anwering Read More
...

Criminal acce omeone’
computer and encrpt the uer’
peronal file and data. The uer i
Correctl: 39% 
unale to acce thi data unle Driving i hort for for “war driving,” which i
Incorrectl:
the pa the criminal to decrpt the a technique where hacker drive around an
12% 
file. Thi practice i called …  area looking for inecure Wi-Fi network.
Not ure: 49%
 
You anwered Not sure 
The correct anwer i Ranomware

“Private rowing” i a feature in
man internet rower that let
uer acce we page without
an information (like rowing Private rowing prevent a uer’ internet
Correctl: 33% 
hitor) eing tored  the rower. rower from toring certain kind of file on
Incorrectl:
Can internet ervice provider ee hi or her device. However, internet ervice
12% 
the online activitie of their provider can till ee all of the detail of the
Not ure: 54%
ucrier when thoe ucrier uer' we traffic.
are uing private rowing? 
 
You correctl anwered Yes

Turning off the GP function of our
Correctl: 10% 
martphone prevent an tracking In addition to GP, martphone can alo e
Incorrectl:
of our phone’ location.  tracked uing the cellphone tower or Wi-Fi
71% 
  network that the phone i connected to.
Not ure: 18%
You correctl anwered False

If a pulic Wi-Fi network (uch a in
an airport or café) require a
ven if a pulic Wi-Fi network require a
paword to acce, i it generall
paword, other uer can potentiall view
afe to ue that network for Correctl: 16% 
the enitive information a uer end
enitive activitie uch a online Incorrectl:
acro that Wi-Fi network. For more
anking?  10% 
information ee:
  Not ure: 73%
http://fieldguide.gizmodo.com/how-to-ta-
You anwered Not sure 
afe-on-pulic-wifi-1779464400
The correct anwer i No, it i not
afe

What kind of cerecurit rik can
A Virtual Private Network (VPN) allow uer
e minimized  uing a Virtual Correctl: 13% 
to create an encrpted connection etween
Private Network (VPN)?  Incorrectl:
their device and the internet, making it
  16% 
much harder for anone other than the uer
You correctl anwered Use of Not ure: 70%
to ee their activit.
insecure Wi-Fi networks

HAR    Y O U R COR

 TWEET  SHARE

For more research and analysis, follow Pew Research Center 
on twitter, facebook, or sign up for our weekly newsletter:
http://www.pewinternet.org/quiz/cybersecurity-knowledge/ 3/4
2/23/2018 Cybersecurity Knowledge Quiz | Pew Research Center

Follow

Like

Sign Up

Latest Internet and Technology Research

Take More Quizzes

Crossing the Line: What Counts as Online Harassment?

Public Comments to the Federal Communications Commission About Net Neutrality Contain Many Inaccuracies
and Duplicates

The Future of Truth and Misinformation Online

Automation in Everyday Life

How People Approach Facts and Information

E M B ED </> © P E W RESEAR C H C E N T E R

http://www.pewinternet.org/quiz/cybersecurity-knowledge/ 4/4

Potrebbero piacerti anche