IPF Women CyberSecurity Quiz

IPF Women CyberSecurity Quiz

Professional Development

10 Qs

quiz-placeholder

Similar activities

Complete Recovery  EQ DAY 2

Complete Recovery EQ DAY 2

Professional Development

10 Qs

Design Thinking - Quiz

Design Thinking - Quiz

Professional Development

15 Qs

Verificando contenido Sesión 1 NC

Verificando contenido Sesión 1 NC

Professional Development

10 Qs

21st Century Learning

21st Century Learning

Professional Development

11 Qs

Behavioral Test

Behavioral Test

Professional Development

10 Qs

Internal Auditor SMK3

Internal Auditor SMK3

Professional Development

10 Qs

social selling

social selling

Professional Development

12 Qs

Anime 99

Anime 99

9th Grade - Professional Development

13 Qs

IPF Women CyberSecurity Quiz

IPF Women CyberSecurity Quiz

Assessment

Quiz

Professional Development

Professional Development

Medium

Created by

GIRISH KRISHNA

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which one of the following describes spam message?

Gathering information about a person or organisation without their knowledge.

Performing an unauthorised, usually malicious, action such as erasing files.

Sending unwanted bulk messages.

Putting unnecessary load on the network by making copies of files.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A hacker locks out users and encrypts their personal computer files and data, holding it hostage until they agree to pay to the attacker. What is this practice called?

Browser hijacker

Ransomware

Brute-force

Worm

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following describes why it is important to update antivirus software regularly?

To protect your computer from all known computer viruses.

To ensure the software identifies old viruses.

To protect your computer from unwanted bulk messages.

To prevent the spread of malicious programs on the Internet.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following is MOST likely to be a hoax?

An email from a friend you have not seen recently.

An email with an attachment sent by a colleague using their personal email address.

An email asking you to go to a website for a free computer scan.

An email advertisement from a local shop you subscribe to.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following statements about a password is TRUE?

It must be changed only if it is compromised.

It cannot contain special character symbols.

It must be registered with the system administrator.

It should be changed regularly

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which one of the following an unsafe online activity?

Using a screen name or nick name that cannot identify you.

Meeting someone you met online face-to-face in the company of your parents.

Keeping your social network profile private.

Giving your home address to someone you met in a public online chat room.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is a common example of a "phishing" attack?

You receive an email from an acquaintance who you are rarely in contact with that contains only a web link.

You got an email that appears to be from your bank asking you to enter your account number and password, but the web address looks unfamiliar.

You received a text message claiming that you won a contest and asking you to click on the link.

All of the above

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?

Discover more resources for Professional Development