Cybersecurity

Cybersecurity

Professional Development

10 Qs

quiz-placeholder

Similar activities

Digital Footprint Seminar Assessment

Digital Footprint Seminar Assessment

Professional Development

15 Qs

Data Ethics and Security

Data Ethics and Security

Professional Development

8 Qs

Web Browsers

Web Browsers

Professional Development

10 Qs

Unit 8: Computers and Internet Safety

Unit 8: Computers and Internet Safety

Professional Development

10 Qs

Security 4/22

Security 4/22

Professional Development

11 Qs

Be Wary of Phishing

Be Wary of Phishing

Professional Development

10 Qs

OWASP Top 10

OWASP Top 10

Professional Development

10 Qs

Sec+ CH.2 Review Test

Sec+ CH.2 Review Test

Professional Development

15 Qs

Cybersecurity

Cybersecurity

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Urs Schild

Used 429+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The implementation of which security method has the greatest positive influence on security?

Mature Identity & Access Management

Implementation of strong password guidelines & password management

Application of Secure Coding Methods

Holistic People Powered Security in the organisation

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the biggest cyber security threat?

The human factor

Malware of any kind

Unencrypted communication

Theft of mobile devices

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What measures can be taken to minimize the attack surface for social engineering?

Use of password managers

Encryption of all communication and data

Work exclusively in a secure environment

Minimizing the communication of personal information

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which password is most secure?

LO4ndon7

#fr41963§

%27T#wbZ3

LondonattheThames2019

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the consequences of a virus?

It is destroying your screen.

It opens your e-mail account

It deletes/copies data

It will help you work.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Generic term for all methods used to spy on passwords.

Cyber Grooming

Information Diving

Phishing

Clustering

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Someone's trying to gain access to a computer network.

Cyber Grooming

Information Diving

Pretexting

Hacking

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?