Threats and Risks

Threats and Risks

Professional Development

12 Qs

quiz-placeholder

Similar activities

Cybersecurity Quiz

Cybersecurity Quiz

Professional Development

9 Qs

Internet Safety. Privacy

Internet Safety. Privacy

Professional Development

10 Qs

AZ-900 Modulo 2

AZ-900 Modulo 2

KG - Professional Development

14 Qs

Cloud Begins with Me - NUS

Cloud Begins with Me - NUS

Professional Development

17 Qs

Cyber Security Awareness - TC Pacific IT Service Desk

Cyber Security Awareness - TC Pacific IT Service Desk

Professional Development

10 Qs

Activate Learning - Reading College

Activate Learning - Reading College

Professional Development

10 Qs

Sec+ CH.1 Review Test

Sec+ CH.1 Review Test

Professional Development

15 Qs

IT General Control

IT General Control

Professional Development

10 Qs

Threats and Risks

Threats and Risks

Assessment

Quiz

Computers

Professional Development

Easy

Created by

CJ O'Grady

Used 15+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In cybersecurity, a threat actor is a group or person behind a malicious incident. Which of these is NOT an identified example

Nation states

Criminal gangs or individuals

Sales teams

Political activists

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is 'phishing'?

A misspelling of fishing

pretending to be someone else online

fake email to try to trick you into giving personal information

A way of illegally downloading films and games

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Media Image

Which of these are types of malware?

viruses

spyware

trojan

phishing email

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

What is 'ransomware'

When you buy illegal DVDs

A type of cyber attack when you PC is locked and you have to pay to get access

A program that tracks your keystrokes

When someone spies on you via your webcam

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Fill in the blanks: ______ is used legitimately in free versions of applications to display advertisements while a program is running but can be classified as ______ if the code records users' information or browsing habits without their consent and authorization.

Social engineering; malvertising

Adware; spyware

Shareware; malware

Adware; ransomware

6.

MULTIPLE SELECT QUESTION

2 mins • Ungraded

You see an app you think will really help your staff. What might be a threat to introducing it?

Your ability to push through change

The actual Installation, setup and deployment

Time to test and evaluate

Staff enthusiasm

Training time

7.

MULTIPLE SELECT QUESTION

30 sec • Ungraded

The program/app that is being introduced needs to have student data added. How is this usually done at your workplace?

I type in the details for each manually

Each teacher has to do their class

The IT support/someone else will do it

I can use data exported from the MIS

don't know

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?