
DMA IT CYBERSECURITY DAY
Authored by El Youness
Instructional Technology
1st - 3rd Grade
Used 5+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
18 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Which of the following is an example of a “phishing” attack?
Sending someone an email that contains a malicious link that is disguised to look like an email from someone the person knows
Creating a fake website that looks nearly identical to a real website in order to trick users into entering their login information
Sending someone a text message that contains a malicious link that is disguised to look like a notification that the person has won a contest
All of the options
2.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Which of the following four passwords is the most secure?
Boat123
WTh!5Z
into*48
123456
3.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Criminals access someone’s computer and encrypt the user’s personal files and data. The user is unable to access this data unless they pay the criminals to decrypt the files. This practice is called …
Botnet
Ransomware
Driving
Spam
None of the above
4.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
If a public Wi-Fi network (such as in an airport or café) requires a password to access, is it generally safe to use that network for sensitive activities such as online banking (Finance) & system approvals?
Yes, It is safe
No, it is not safe
5.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
What kind of cybersecurity risks can be minimized by using a Virtual Private Network (VPN)?
Use of insecure Wi-Fi networks
Key-logging
De-anonymization by network operators
Phishing attacks
6.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Cyber security protection of an organization is the responsibility of:
Everyone in the organization.
The CIO or CISO executive / IT Department
A specialized cyber security defense team
The board of directors
7.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Social engineering uses which aspects of human nature?
Trust manipulation
Desire to be helpful
Lack of understanding
All of the options
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?