Security Awareness

Security Awareness

Professional Development

5 Qs

quiz-placeholder

Similar activities

CJS - Cyber Hygiene & Cybersecurity Awareness Workshop

CJS - Cyber Hygiene & Cybersecurity Awareness Workshop

Professional Development

10 Qs

Cyber Security Quiz

Cyber Security Quiz

Professional Development

10 Qs

Cyber Security Awareness - TC Pacific IT Service Desk

Cyber Security Awareness - TC Pacific IT Service Desk

Professional Development

10 Qs

Cybersecurity Quiz

Cybersecurity Quiz

Professional Development

9 Qs

IT General Control

IT General Control

Professional Development

10 Qs

Online Security

Online Security

Professional Development

10 Qs

Teacher Quiz

Teacher Quiz

Professional Development

10 Qs

Security+ Lesson 8

Security+ Lesson 8

Professional Development

10 Qs

Security Awareness

Security Awareness

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Sabrina Young

Used 1+ times

FREE Resource

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

CyberSecurity is everybody's

business

responsibility

job

favourite thing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Option Below is NOT a sign of a phishing email?

Generic Greeting or Signature

Inconsistent email addresses, links and domain names

An attachment you were expecting

Threats or a sense of urgency

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Tip Will Not Help Prevent Malware?

Use antivirus/antimalware software

Click on hyperlinks

Only download reputable apps/software

Only visit reputable websites

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Option Below is NOT a Password Best Practice

Use a long passphrase that's easy for you to remember but hard for others to guess

Use new, unique passwords for every account

Keep passwords secret (e.g. use a password manager)

Change compromised passwords when you get a chance

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What team should you contact if you see something suspicious (e.g. unusual email request, password sharing, leakage of business information, etc.)