Cyber Security 101

Cyber Security 101

University

10 Qs

quiz-placeholder

Similar activities

Meme Quiz

Meme Quiz

1st Grade - Professional Development

8 Qs

Red Queen

Red Queen

KG - University

10 Qs

Neurotransmitter

Neurotransmitter

University - Professional Development

15 Qs

Tax Goes to School

Tax Goes to School

University

15 Qs

Discounted Room rates

Discounted Room rates

University

10 Qs

Labor Relations and Negotations 1

Labor Relations and Negotations 1

University - Professional Development

15 Qs

DISEASES & DISORDERS #1

DISEASES & DISORDERS #1

7th Grade - University

12 Qs

Driving Theory Test: Alertness

Driving Theory Test: Alertness

KG - Professional Development

10 Qs

Cyber Security 101

Cyber Security 101

Assessment

Quiz

Other

University

Practice Problem

Medium

Used 265+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Who is responsible for Cyber Security?

Technology Information Security Office
Developers
Government
Everyone

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

When receiving an email from an unknown contact that has a link, you should?

Open the link to view its contents
Report the suspicious email to TISO
Forward the email to your co-workers to allow them to open the link first
Forward the email to your personal email account so you can open it at home

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

How can you tell if a website encrypts its traffic?

 Google it
 Look for the lock symbol in a URL
All websites encrypt their traffic
Encrypted sites take longer to load

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Media Image

If you see a pop-up message like this when you’re on the web, you should: 

Click OK to decide whether it is a legitimate offer
Click Cancel
Press Ctrl + F4 on your keyboard to close it
Click the X button

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following circumstances should you treat as suspicious?

 Flight information attachment from airline when no travel is planned
 Request from Bank with  a link to update information
 Email from unknown sender with an urgent message requiring action
All of the above

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Who are Hackers?

They are benign computer experts
They are malicious computer criminals
Hackers could be both benign computer experts and malicious computer criminals
Investment Bankers

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

These days in the media it is not uncommon to hear that organisations and companies have suffered from cyber-attacks. The popular image is that these attacks are carried out by so-called malicious hackers that are external to an organisation. However several observations show that many of these attacks are carried out by organisation employees/officers or former employees. What is the common name which is given to this latter type of threat?

Ethical hacking
Trolling
Insider Threat
Honeypot

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?