Hack-proof or hack-prone? Take the cyber test you didn’t know you needed

Welcome to the test that separates the cyber-savvy from the cyber-sloppy. You may think you’re safe. You don’t click on strange links. You use strong passwords. But do you understand the hidden ways hackers exploit your habits, devices, and even your emotions?

This isn’t a tech test. It’s a human test.

We’re not just checking what you know. We’re revealing what you overlook, those tiny blind spots that make the difference between a secure system and a silent breach.

Find out:

  1. Would your phone survive a targeted phishing attempt?
  2. Can your laptop resist a rogue USB with embedded malware?
  3. Do your habits make you the weakest link in your company’s cybersecurity chain?

Who should take it?

  1. CEOs who think cybersecurity is “for the IT guys.”
  2. Employees who reuse passwords like “Uganda2024!”
  3. Parents, students, bankers, NGO workers, boda riders, yes, you too.

Why take it now?

Because ignorance isn’t bliss. It’s a liability.

Score yourself. Then see where you fall:

Fort Knox-You’re a digital fortress (rare).

Almost There — Good instincts, but one crack can cost you.

 At Risk– One wrong click and you’re viral… in the worst way.

 Walking Breach — You’re a hacker’s dream. Time for a full reset.

Start the test. Fix your gaps. Share your score.

0%
2

Cyber Security

Cyber Hygiene Test: Mobile phone user edition

  • This test consists of 20 multiple-choice questions.
    Each question has only one correct answer. Read all options carefully before selecting your response.

  • You are required to complete the test independently.
    Do not use internet searches, books, or receive help from others during the test.

🔒 Personal Details
Kindly fill in your details below to receive a personalized copy of your quiz responses. By sharing your information, you’ll also get a chance to access exclusive insights, expert tips, and updates on upcoming forensic tools, training opportunities, and cybersecurity events. Stay informed. Stay ahead.

1 / 21

Category: Cyber Security

1. What is the most secure way to manage your passwords across various apps and websites?

2 / 21

Category: Cyber Security

2. Which of the following is the most secure method of unlocking your phone?

3 / 21

Category: Cyber Security

3. Why should you avoid using the same password across multiple accounts?

4 / 21

Category: Cyber Security

4. What is the purpose of Two-Factor Authentication (2FA)?

5 / 21

Category: Cyber Security

5. What should you do when an app requests access to sensitive features like your camera, contacts, or location?

6 / 21

Category: Cyber Security

6. Which of the following is a red flag when evaluating whether an app is trustworthy?

7 / 21

Category: Cyber Security

7. What is the best practice for handling unused mobile apps?

8 / 21

Category: Cyber Security

8. Why is it dangerous to install apps from unofficial sources (outside the Google Play Store or Apple App Store)?

9 / 21

Category: Cyber Security

9. Which tactic is commonly used in phishing scams targeting mobile phone users?

10 / 21

Category: Cyber Security

10. What should you always do before clicking on a link sent via SMS or messaging apps like WhatsApp?

11 / 21

Category: Cyber Security

11. Is it safe to use public Wi-Fi without taking precautions?

12 / 21

Category: Cyber Security

12. What does a VPN (Virtual Private Network) do?

13 / 21

Category: Cyber Security

13. Why is it important to change the default password of your mobile hotspot?

14 / 21

Category: Cyber Security

14. How can you identify a potentially fake or malicious website?

15 / 21

Category: Cyber Security

15. Why do hackers create fake promotions and giveaways?

16 / 21

Category: Cyber Security

16. Why is it important to install operating system and app updates regularly?

17 / 21

Category: Cyber Security

17. What should you consider before granting an app access to your location?

18 / 21

Category: Cyber Security

18. How can you protect your data in case your phone is lost or stolen?

19 / 21

Category: Cyber Security

19. Why should you install antivirus or security apps on your phone?

20 / 21

Category: Cyber Security

20. What is the potential risk of keeping Bluetooth and location services always enabled?

21 / 21

Category: Cyber Security

21. What should you do if you receive a suspicious SMS claiming to be from your bank?

Because in today’s digital world, you’re either hack-proof or hack-prone.

Powered by Summit Consulting’s iShield360 & IFIS

Previous Post
Next Post

About Company

At the Institute of Forensics & ICT Security (IFIS), we specialize in bridging the gap between knowledge and application.

Most Recent Posts

  • All Posts
  • Blog
  • Career Management
  • Computer Security
  • Cyber Defence
  • Cyber Incidence Response
  • Cyber Preparedness
  • Cyber Security
  • Data Privacy
  • Endpoint Security
  • Fraud Investigation and Examination
  • Fraud Management
  • IT Security Audit
  • Marketing
  • Mobile Security
  • Training
  • UX/UI Design
  • Web Development

Category

Tags

You have been successfully Subscribed! Ops! Something went wrong, please try again.

About Us

 we specialize in bridging the gap between knowledge and application.

Recent news

  • All Post
  • Blog
  • Career Management
  • Computer Security
  • Cyber Defence
  • Cyber Incidence Response
  • Cyber Preparedness
  • Cyber Security
  • Data Privacy
  • Endpoint Security
  • Fraud Investigation and Examination
  • Fraud Management
  • IT Security Audit
  • Marketing
  • Mobile Security
  • Training
  • UX/UI Design
  • Web Development

© 2025 All rights reserved Institute of Forensics and ICT Security | IFIS is the training arm of Summit Consulting Ltd