Control the Outbreak Challenge Questions

Control the Outbreak Challenge Questions

3rd Grade

15 Qs

quiz-placeholder

Similar activities

Introduction to Internet

Introduction to Internet

3rd Grade

13 Qs

P6 Connector

P6 Connector

1st - 6th Grade

15 Qs

Cyber Security Malware Social Engineering

Cyber Security Malware Social Engineering

3rd Grade

12 Qs

Kalasag Hacker's Night Game Time

Kalasag Hacker's Night Game Time

KG - Professional Development

15 Qs

Communication & Networking - Network Policies

Communication & Networking - Network Policies

3rd - 12th Grade

10 Qs

Cyber Security Quiz

Cyber Security Quiz

1st - 5th Grade

10 Qs

Linux-1 Week 6

Linux-1 Week 6

1st - 5th Grade

16 Qs

III Internet

III Internet

3rd Grade

19 Qs

Control the Outbreak Challenge Questions

Control the Outbreak Challenge Questions

Assessment

Quiz

Computers

3rd Grade

Hard

Created by

Adrianna Dar

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is your first step when responding to a cyber attack?

Disconnect all devices from the network

Analyze the network traffic

Notify the appropriate authorities

Identify the source of the attack

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of following a risk assessment in a cyber attack?

To determine the severity of the attack

To identify vulnerabilities and potential impacts

To recover lost data

To block the attacker's IP address

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a preventive measure against cyber attacks?

Installing antivirus software

Changing passwords regularly

Performing regular backups

Conducting a post-incident analysis

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you do if you discover a phishing email in an employee's inbox?

Delete the email immediately

Reply to the email to gather more information

Report the email to the IT department

Forward the email to all employees as a warning

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a social engineering attack?

Distributed Denial of Service (DDoS) attack

SQL injection attack

Man-in-the-Middle (MitM) attack

Phishing attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can you secure your wireless network against unauthorized access?

Disable encryption on the network

Use a strong password for the Wi-Fi network

Share the Wi-Fi password with everyone in the office

Use the default network name and password

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you do if an employee loses a company-issued mobile device?

Ignore the incident as it poses no immediate threat

Report the incident to the local authorities

Change all passwords associated with the device

Wait for the employee to find the device before taking action

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?