This repository contains the Security Questionnaire survey. Below is the full structure of the survey, including sections, questions, answer types, and all possible answers explicitly enumerated.
- Prolific ID
Type:text(required)
-
What is your sex?
Type:radiogroup(required)
Choices:- Female
- Male
- Prefer not to say
- Other (specify)
-
In which age group do you belong?
Type:radiogroup(required)
Choices:- <18
- 18–24
- 25–34
- 35–44
- 45–54
- 55+
-
Which income bracket best represents your household income?
Type:radiogroup(required)
Choices:- <$25,000
- $25,000–$50,000
- $50,001–$75,000
- $75,001–$100,000
- $100,001–$200,000
- $200,001+
-
What is your highest level of education completed?
Type:radiogroup(required)
Choices:- None
- High school diploma
- Some College, No Degree
- Technical Certification (e.g: mechanic, carpentry, etc.)
- Associate Degree
- Bachelor's
- Master's
- Ph.D
- Prefer not to say
-
Which best describes your profession or area of study?
Type:checkbox(required, multiple allowed)
Choices:- Architecture and Engineering
- Arts, culture, and entertainment
- Business, management, and administration
- Communications
- Community and social services
- Education
- Science and technology
- Installation, repair, and maintenance
- Farming, fishing, and forestry
- Health and medicine
- Law
- I am not in school at the moment
- Other (specify)
-
What is your current employment status?
Type:radiogroup(required)
Choices:- Employed full-time
- Employed part-time
- Unemployed
- Student
- Student + employed full-time
- Student + employed part-time
- Retired
- Homemaker
-
Which degree are you currently pursuing?
Type:radiogroup(required)
Choices:- Undergraduate
- Graduate
- Certificate Programs
- Other (specify)
-
Have you taken courses in any of the following subjects?
Type:checkbox(required)
Choices:- Cybersecurity
- Computer Science
- Information Technology
- None of these
-
Have you been employed in any of the following areas?
Type:checkbox(required)
Choices:- Cybersecurity
- Computer Science
- Information Technology
- None of these
-
Do you take interest in cybersecurity, computer science, or information technology?
Type:radiogroup(required)
Choices:- Yes
- No
-
Which of the following media outlets have you visited during the last week?
Type:checkbox(required)
Choices:- Threatpost
- Dark Reading
- Wired
- PC World
- CNET
- CIO
- None of these
-
Which ad-blocker do you use?
Type:radiogroup(required)
Choices:- I don't use any adblocker
- Ghostery
- Ad-blocker
-
Which Password Manager do you use?
Type:radiogroup(required)
Choices:- I don't have a password manager
- LastPass
- NordPass
- 1Password
- Other (specify)
-
How important is backup security to you?
Type:radiogroup(required)
Choices:- Very important
- Somewhat important
- Somewhat unimportant
- Not important at all
- I don't know what backup security is
-
Which operating system is your main operating system?
Type:radiogroup(required)
Choices:- Windows OS (Windows7, 8, or 10)
- Unix-based OS (Ubuntu, Fedora, Redhat, etc)
- MacOS
- Other (specify)
-
Give a score to your current cybersecurity skills.
Type:rating(required)
Scale: Zero Experience → Cybersecurity Maestro
-
Which of the following programming languages are you familiar with? (More than a year of experience)
Type:checkbox(required)
Choices:- Java
- JavaScript
- C/C++
- C#
- Python
- HTML
- PHP
- Perl
- Ruby
- SQL
- Assembly
- None of these
-
What programming language is the most susceptible to buffer overflow attacks?
Type:radiogroup(required)
Choices:- Java
- Python
- C/C++
- I don't know
-
Which of the following cyber attacks are you familiar with?
Type:checkbox(required)
Choices:- Man-in-the-middle (MitM)
- Phishing
- SQL injection
- Cross-site-scripting (XSS)
- Ransomware
- Denial-of-service (DoS)/Distributed Denial-of-Service (DDoS)
- CSRF
- None of these
-
SQL injection can happen because _____ has vulnerabilities.
Type:radiogroup(required)
Choices:- Database Server
- Browser
- Web Application
- I don't know
-
Cross site scripting is a ______ attack.
Type:radiogroup(required)
Choices:- Server side
- Client side
- Database
- I don't know
-
ASLR is a defense mechanism against ______.
Type:radiogroup(required)
Choices:- Cross site scripting (XSS)
- Buffer Overflow
- Distributed Denial of Service (DDoS)
- I don't know
-
When was the last time you used SSH to connect to a remote server?
Type:radiogroup(required)
Choices:- Within the last week
- Within the last month
- Within the last 6 months
- Within the last year
- I have never used SSH
-
Consider the following command: 'ssh user1-remotehost -p 12345'. Is something wrong?
Type:radiogroup(required)
Choices:- Yes, the first argument should be scp instead of ssh
- Yes, the separation should be with @ instead of -
- Yes, you cannot specify the port this way
- No, there is nothing wrong with the syntax
- I don't know SSH
-
Ransomware does which of the following?
Type:radiogroup(required)
Choices:- Gives attackers remote control of the victim's machine
- Is used for task automation in DDoS attacks
- Blocks access to victim's data until ransom is paid
- Tracks browsing activities for ads
-
Have you been a victim of a ransomware attack?
Type:radiogroup(required)
Choices:- Yes, paid ransom
- Yes, did not pay ransom
- No, not a victim
- I don't know
-
If yes and did not pay ransom, why not?
Type:radiogroup(required)
Choices:- Ransom not worth recovery
- Had backup
- Outside recovery available
- Never a victim
-
Importance of ransomware protection (1–5).
Type:rating(required) -
How likely are you to be targeted by ransomware?
Type:dropdown(required)
Choices:- Very likely
- Somewhat likely
- Somewhat unlikely
- Very unlikely
- I don't know
-
Would you pay a ransom fee if no backup?
Type:radiogroup(required)
Choices:- Definitely No
- Yes, if fee < $1000
- Yes, if fee < $500
- Yes, if installments allowed
-
Do you use antivirus on your PC? If so, how long?
Type:radiogroup(required)
Choices:- Yes, less than 6 months
- Yes, over 1 year
- Yes, over 5 years
- Yes, over 10 years
- No
-
Do you currently have ransomware protection installed?
Type:radiogroup(required)
Choices:- Yes
- No and don't plan to
- No but plan to
- I don't know
-
Do you use backup services on your PC? If so, how long?
Type:radiogroup(required)
Choices:- Yes, over 1 month
- Yes, over 6 months
- Yes, over 1 year
- Yes, over 5 years
- Yes, over 10 years
- No
-
What tier of backup security service do you use?
Type:radiogroup(required)
Choices:- Free version
- Paid, <50 GB
- Paid, 50-100 GB
- Paid, 100-250 GB
- Paid, 250-500 GB
- Paid, 500-1000 GB
- Paid, >1 TB
- None
-
Which backup services have you used?
Type:checkbox(required)
Choices:- Acronis True Image
- Paragon Backup and Recovery
- NovaBackup
- EaseUS ToDo Backup
- Malwarebytes Secure Backup
- Heilig Defense RansomOff
- Google One
- Microsoft OneDrive
- Dropbox
- iCloud
- None of these
-
Automated vs. manual backups?
Type:radiogroup(required)
Choices:- Prefer only automated
- Prefer only manual
- Prefer both
- No interest in backup security
-
What is your preferred backup method?
Type:radiogroup(required)
Choices:- I don't use backup security
- Full
- Incremental
- Differential
- Individual files/folders
- I don't know what they are
- Other (specify)
-
Preferred backup provider?
Type:radiogroup(required)
Choices:- First-party (Apple, Google, Microsoft, etc.)
- Third-party
- No preference (only performance matters)
-
How much is your data worth in dollars?
Type:text (numeric)(required) -
How much are you willing to pay per month for guaranteed protection? Why?
Type:comment(required) -
Would you enroll in a $200/year data protection plan?
Type:radiogroup(required)
Choices:- Yes
- No
-
Please explain your response.
Type:comment(required)
-
What you think the term Social Engineering means?
Type:comment(required) -
Have you taken any cybersecurity training workshops before?
Type:radiogroup(required)
Choices:- No
- Yes (specify)
- Participants are thanked and redirected to Prolific for submission.