Recognizing and Preventing Cyber Threats

Recognizing and Preventing Cyber Threats

Professional Development

10 Qs

quiz-placeholder

Similar activities

Day 3

Day 3

Professional Development

9 Qs

CSIRP Training

CSIRP Training

Professional Development

10 Qs

Email Basics

Email Basics

10th Grade - Professional Development

10 Qs

EY GDS Remote Work Part III

EY GDS Remote Work Part III

Professional Development

15 Qs

Application Layer

Application Layer

Professional Development

12 Qs

Malware Security

Malware Security

Professional Development

15 Qs

IT Security

IT Security

Professional Development

10 Qs

Business Communication

Business Communication

Professional Development

15 Qs

Recognizing and Preventing Cyber Threats

Recognizing and Preventing Cyber Threats

Assessment

Quiz

Professional Development

Professional Development

Medium

Created by

Martha Ruelas

Used 5+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of a phishing attack?

To encrypt your files

To gain unauthorized access to your accounts

To make your computer run faster

To improve your internet speed

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common sign of a malware infection?

Slow computer performance

Frequent software updates

Unread emails in your inbox

A cluttered desktop

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you do if you receive an email from an unknown sender with a suspicious link?

Click on the link to see where it leads

Forward the email to all your contacts

Delete the email without clicking on the link

Reply to the email asking for more information

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can you protect your data from a ransomware attack?

Never use the internet

Regularly back up your data to offline or cloud storage

Pay the ransom to the attackers

Share your passwords with trusted friends

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is social engineering in the context of cybersecurity?

A type of computer virus

A method for securing your social media accounts

Manipulating individuals into revealing sensitive information

A new form of online social networking

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does "DDoS" stand for in cybersecurity?

Digital Data Security

Distributed Denial of Service

Data Download and Storage

Direct Data Sharing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can you reduce the risk of falling victim to a social engineering attack?

Share your personal information with anyone who asks for it

Verify the identity of the requester and be cautious about sharing sensitive information

Post all your personal information on social media

Use the same password for all your accounts

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?