MDCC Cyber Security Training Quiz 2

MDCC Cyber Security Training Quiz 2

University

7 Qs

quiz-placeholder

Similar activities

Teacher Camp 7/11

Teacher Camp 7/11

University

10 Qs

Vocabulary - Computer - 02

Vocabulary - Computer - 02

12th Grade - University

10 Qs

Khám phá office 365

Khám phá office 365

9th Grade - University

6 Qs

Basic Cyber Awareness Test

Basic Cyber Awareness Test

University

10 Qs

What I Must Know to Survive NUS

What I Must Know to Survive NUS

University

12 Qs

Introductions, Assessments, and Logins

Introductions, Assessments, and Logins

University

10 Qs

Be CyberSmart

Be CyberSmart

KG - Professional Development

6 Qs

How much do I know about Moodle?

How much do I know about Moodle?

University

9 Qs

MDCC Cyber Security Training Quiz 2

MDCC Cyber Security Training Quiz 2

Assessment

Quiz

Computers, Instructional Technology

University

Hard

Created by

Torrey Moore

Used 12+ times

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

This is a type of attack where the bad guys attempt to trick you into revealing personal information through text messages.

Sniffing

Smishing

Hacking

Texting

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

This term refers to a social engineering technique where an unauthorized individual gains physical entry into a building or room by closely following behind someone who is authorized.

Sneaking

Tailgating

Tag Teaming

Hatch backing

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

You are on vacation and your manager calls, asking for your password to get an urgently needed file. What should you do?

Give your password over the phone since this is an urgent request.

Hang up and call your manager back to make sure to make sure the request is legitimate.

Email your password to your manager to make sure no one overhears it.

Remind your manager of organization password policies and procedures.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following passwords is most secure?

mdcc1927!@#$%

Trojans are the greatest

MdccTrojans!(@&1927

Mdcctrojans

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

I opened an unknown attachment in an email message and strange windows flickered on the screen. What should I do?

Restart the system; that should fix the problem.

Contact the sender of the email and tell them about the problem.

Contact IT about the email and tell them about the problem.

Delete the email and empty the system trash can.

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Why should you use a virtual private network (VPN) when connecting to public Wifi?

So no one can see your screen.

Because it provides 100% security.

To prevent someone from intercepting you connection and stealing data.

Because it makes your connection stronger and faster.

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

How do social engineers successfully manipulate people? Choose all that apply.

By collecting personal information found on public forums like social media.

By following closely behind real employees as they enter the building.

By impersonating members of our organization, such as the IT department.

By planting malicious USB flash drives around our organizations.