Recognizing and Preventing Cyber Threats

Recognizing and Preventing Cyber Threats

Professional Development

10 Qs

quiz-placeholder

Similar activities

Coding Training

Coding Training

5th Grade - Professional Development

7 Qs

Windows Basics

Windows Basics

10th Grade - Professional Development

10 Qs

Professional Ethics

Professional Ethics

Professional Development

12 Qs

IRON Label Course 107-108

IRON Label Course 107-108

Professional Development

15 Qs

Cyber Security New

Cyber Security New

Professional Development

15 Qs

Money Managment Basics

Money Managment Basics

Professional Development

10 Qs

Windows 10 and PC Troubleshooting

Windows 10 and PC Troubleshooting

Professional Development

7 Qs

CTIP

CTIP

Professional Development

10 Qs

Recognizing and Preventing Cyber Threats

Recognizing and Preventing Cyber Threats

Assessment

Quiz

Professional Development

Professional Development

Medium

Created by

Martha Ruelas

Used 5+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of a phishing attack?

To encrypt your files

To gain unauthorized access to your accounts

To make your computer run faster

To improve your internet speed

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common sign of a malware infection?

Slow computer performance

Frequent software updates

Unread emails in your inbox

A cluttered desktop

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you do if you receive an email from an unknown sender with a suspicious link?

Click on the link to see where it leads

Forward the email to all your contacts

Delete the email without clicking on the link

Reply to the email asking for more information

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can you protect your data from a ransomware attack?

Never use the internet

Regularly back up your data to offline or cloud storage

Pay the ransom to the attackers

Share your passwords with trusted friends

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is social engineering in the context of cybersecurity?

A type of computer virus

A method for securing your social media accounts

Manipulating individuals into revealing sensitive information

A new form of online social networking

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does "DDoS" stand for in cybersecurity?

Digital Data Security

Distributed Denial of Service

Data Download and Storage

Direct Data Sharing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can you reduce the risk of falling victim to a social engineering attack?

Share your personal information with anyone who asks for it

Verify the identity of the requester and be cautious about sharing sensitive information

Post all your personal information on social media

Use the same password for all your accounts

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Professional Development