Skip to Content
From Monday 12 September 2020, OVIC's website will no longer be supported in Internet Explorer (IE).
We recommend installing Microsoft Edge, Google Chrome, Safari, Firefox, or Opera to visit the site.

Privacy quiz for young people

This year’s Privacy Awareness Week quiz was developed by OVIC’s Youth Advisory Group (YAG)


Privacy trivia 2023

Question 1

Which country does not currently have additional protections for children and young people in its privacy laws and regulations?

Correct!

Australia’s federal privacy legislation, the Privacy Act 1988 (Cth), does not currently have additional privacy protections specifically for children and young people. However, specific privacy protections for children and young people are being proposed in the current review of the Privacy Act being undertaken by the Australian Attorney-General’s Department.

The United States of America have the Children’s Online Privacy Protection Act (COPPA). The United Kingdom has the Age Appropriate Design Code (also known as the UK Children’s Code). The European Union has specific protections for young people in the General Data Protection Regulation (GDPR).

Incorrect!

Australia’s federal privacy legislation, the Privacy Act 1988 (Cth), does not currently have additional privacy protections specifically for children and young people. However, specific privacy protections for children and young people are being proposed in the current review of the Privacy Act being undertaken by the Australian Attorney-General’s Department.

The United States of America have the Children’s Online Privacy Protection Act (COPPA). The United Kingdom has the Age Appropriate Design Code (also known as the UK Children’s Code). The European Union has specific protections for young people in the General Data Protection Regulation (GDPR).

Question 2

Most malware (malicious software designed to disrupt or gain access to computer systems) is delivered via:

Correct!

According to the 2019 Data Breach Investigations Report by Verizon, 94% of malware is delivered by email. Be on the lookout for phishing emails! You can learn how to spot a phishing email on OVIC’s website here.

Incorrect!

According to the 2019 Data Breach Investigations Report by Verizon, 94% of malware is delivered by email. Be on the lookout for phishing emails! You can learn how to spot a phishing email on OVIC’s website here.

Question 3

What are signs that your device has been hacked?

Correct!

All of these are signs that your device may have been hacked.
  • If new applications have appeared without you installing them, there may be malware on the device that is installing these applications.
  • If the device’s battery is draining more quickly, it may be because there is malware running in the background to monitor and capture user activity, which uses up battery power.
  • If you see outgoing messages that you did not send, there may be malware on your device sending messages to your contacts to try to obtain their personal information.
  • If the device is suddenly using a lot more internet data, it could be malware or spy apps that are scanning your device and transmitting information back to the hacker’s server.

Incorrect!

All of these are signs that your device may have been hacked.
  • If new applications have appeared without you installing them, there may be malware on the device that is installing these applications.
  • If the device’s battery is draining more quickly, it may be because there is malware running in the background to monitor and capture user activity, which uses up battery power.
  • If you see outgoing messages that you did not send, there may be malware on your device sending messages to your contacts to try to obtain their personal information.
  • If the device is suddenly using a lot more internet data, it could be malware or spy apps that are scanning your device and transmitting information back to the hacker’s server.

Question 4

If your profile on a social media platform is set to private, your information is completely private.

Correct!

While you attain some level of protection by setting your account to private, this isn’t completely foolproof. Your data is still being stored online, where it faces the risk of being sold to third parties. Even when your account is set to private, some advertisers can still access location data, basic profile information and status updates.

Incorrect!

While you attain some level of protection by setting your account to private, this isn’t completely foolproof. Your data is still being stored online, where it faces the risk of being sold to third parties. Even when your account is set to private, some advertisers can still access location data, basic profile information and status updates.

Question 5

Which of these activities are safe to do while using public Wi-Fi networks?

Correct!

None of the above. Public Wi-Fi hotspots may be set up by criminals hoping to steal user information. These networks can be set up to appear legitimate, so there is always a risk that the public network you are using is not secure. Connecting to any Wi-Fi involves transferring data from your device to the network. Private Wi-Fi servers are encrypted and password protected. This means that the information is a lot more difficult to collect or distribute. Public servers are less protected and may be unencrypted. This makes users vulnerable to malware distribution and data theft. Additionally, public Wi-Fi servers have more digital traffic than private networks. This increases the likelihood of cybercriminals targeting a larger pool of users. As a result, criminals are more inclined to target public networks with their scams and viruses.

Incorrect!

None of the above. Public Wi-Fi hotspots may be set up by criminals hoping to steal user information. These networks can be set up to appear legitimate, so there is always a risk that the public network you are using is not secure. Connecting to any Wi-Fi involves transferring data from your device to the network. Private Wi-Fi servers are encrypted and password protected. This means that the information is a lot more difficult to collect or distribute. Public servers are less protected and may be unencrypted. This makes users vulnerable to malware distribution and data theft. Additionally, public Wi-Fi servers have more digital traffic than private networks. This increases the likelihood of cybercriminals targeting a larger pool of users. As a result, criminals are more inclined to target public networks with their scams and viruses.

Question 6

Do parents have the right to manage their child’s privacy up until the age of 18?

Correct!

Australia’s federal privacy legislation, the Privacy Act 1988 (Cth), does not specify an age after which an individual can make their own privacy decision. For their consent to be valid, the individual must have capacity to consent. The Commonwealth privacy regulator advises that an organisation handling the personal information of an individual under the age of 18 must decide if the individual has the capacity to consent on a case-by-case basis. If the organisation determines or is concerned the individual does not have the capacity to consent, a parent or guardian can provide consent on their behalf. However, if it’s not practical for an organisation to assess the capacity of individuals on a case-by-case basis, as a general rule, an organisation or agency may assume an individual over the age of 15 has capacity.

Incorrect!

Australia’s federal privacy legislation, the Privacy Act 1988 (Cth), does not specify an age after which an individual can make their own privacy decision. For their consent to be valid, the individual must have capacity to consent. The Commonwealth privacy regulator advises that an organisation handling the personal information of an individual under the age of 18 must decide if the individual has the capacity to consent on a case-by-case basis. If the organisation determines or is concerned the individual does not have the capacity to consent, a parent or guardian can provide consent on their behalf. However, if it’s not practical for an organisation to assess the capacity of individuals on a case-by-case basis, as a general rule, an organisation or agency may assume an individual over the age of 15 has capacity.

Question 7

In October 2022, which of these countries had the lowest number of social media accounts per person?

Correct!

According to DATAREPROTAL Japan had the lowest at 3.6, India had the highest number at 9.2, and Australia was in the middle with an average of 6.1 social media accounts per person.

Incorrect!

According to DATAREPROTAL Japan had the lowest at 3.6, India had the highest number at 9.2, and Australia was in the middle with an average of 6.1 social media accounts per person.

Question 8

What information do cookies save?

Correct!

For those who don’t know, a cookie is a small text file placed on your web browser when you visit a site that uses cookies. Cookies are commonly used to save information about your visit to the website. Different types of cookies will remember different things. First-party cookies often remember customised settings, such as your location and user preferences, while third-party cookies can supply content like advertising on websites you visit—and may be used by third parties to track your browsing activities.

Incorrect!

For those who don’t know, a cookie is a small text file placed on your web browser when you visit a site that uses cookies. Cookies are commonly used to save information about your visit to the website. Different types of cookies will remember different things. First-party cookies often remember customised settings, such as your location and user preferences, while third-party cookies can supply content like advertising on websites you visit—and may be used by third parties to track your browsing activities.

Question 9

Is web tracking prevented when you’re browsing in ‘private’ or ‘incognito’ mode?

Correct!

When you use incognito mode on your web browser, your browsing history and form information won't be saved, but your activity may still be visible to websites, your employer or school if you're on their network, and your internet service provider. To make your browsing more secure, consider using a VPN. Remember, while incognito mode may hide your activity from your device, it doesn't make you completely invisible online.

Incorrect!

When you use incognito mode on your web browser, your browsing history and form information won't be saved, but your activity may still be visible to websites, your employer or school if you're on their network, and your internet service provider. To make your browsing more secure, consider using a VPN. Remember, while incognito mode may hide your activity from your device, it doesn't make you completely invisible online.

Question 10

In which year did the first instance of “wireless hacking” occur?

Correct!

Moments before Guglielmo Marconi was going to demonstrate his newest wireless telegraph invention at a lecture, the telegraph began to spell out “Rats”, followed by: “there was a young man from Italy, who diddled the public quite prettily”. The telegraph signal had been “hacked” by Nevil Maskelyne, hoping to demonstrate the vulnerability of Marconi’s wireless invention.

Incorrect!

Moments before Guglielmo Marconi was going to demonstrate his newest wireless telegraph invention at a lecture, the telegraph began to spell out “Rats”, followed by: “there was a young man from Italy, who diddled the public quite prettily”. The telegraph signal had been “hacked” by Nevil Maskelyne, hoping to demonstrate the vulnerability of Marconi’s wireless invention.

Back to top
Back to Top