
Control the Outbreak Challenge Questions
Authored by Adrianna Dar
Computers
3rd Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is your first step when responding to a cyber attack?
Disconnect all devices from the network
Analyze the network traffic
Notify the appropriate authorities
Identify the source of the attack
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of following a risk assessment in a cyber attack?
To determine the severity of the attack
To identify vulnerabilities and potential impacts
To recover lost data
To block the attacker's IP address
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of a preventive measure against cyber attacks?
Installing antivirus software
Changing passwords regularly
Performing regular backups
Conducting a post-incident analysis
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What should you do if you discover a phishing email in an employee's inbox?
Delete the email immediately
Reply to the email to gather more information
Report the email to the IT department
Forward the email to all employees as a warning
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of a social engineering attack?
Distributed Denial of Service (DDoS) attack
SQL injection attack
Man-in-the-Middle (MitM) attack
Phishing attack
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can you secure your wireless network against unauthorized access?
Disable encryption on the network
Use a strong password for the Wi-Fi network
Share the Wi-Fi password with everyone in the office
Use the default network name and password
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What should you do if an employee loses a company-issued mobile device?
Ignore the incident as it poses no immediate threat
Report the incident to the local authorities
Change all passwords associated with the device
Wait for the employee to find the device before taking action
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?