Search Header Logo

Recognizing and Preventing Cyber Threats

Authored by Martha Ruelas

Professional Development

Professional Development

Used 5+ times

Recognizing and Preventing Cyber Threats
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of a phishing attack?

To encrypt your files

To gain unauthorized access to your accounts

To make your computer run faster

To improve your internet speed

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common sign of a malware infection?

Slow computer performance

Frequent software updates

Unread emails in your inbox

A cluttered desktop

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you do if you receive an email from an unknown sender with a suspicious link?

Click on the link to see where it leads

Forward the email to all your contacts

Delete the email without clicking on the link

Reply to the email asking for more information

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can you protect your data from a ransomware attack?

Never use the internet

Regularly back up your data to offline or cloud storage

Pay the ransom to the attackers

Share your passwords with trusted friends

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is social engineering in the context of cybersecurity?

A type of computer virus

A method for securing your social media accounts

Manipulating individuals into revealing sensitive information

A new form of online social networking

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does "DDoS" stand for in cybersecurity?

Digital Data Security

Distributed Denial of Service

Data Download and Storage

Direct Data Sharing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can you reduce the risk of falling victim to a social engineering attack?

Share your personal information with anyone who asks for it

Verify the identity of the requester and be cautious about sharing sensitive information

Post all your personal information on social media

Use the same password for all your accounts

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?