Cyber Resilience Training

Cyber Resilience Training

Professional Development

16 Qs

quiz-placeholder

Similar activities

Linux Command Line Quiz

Linux Command Line Quiz

Professional Development

14 Qs

Anovision 2022 Round 1

Anovision 2022 Round 1

Professional Development

16 Qs

OS Quiz

OS Quiz

Professional Development

15 Qs

MS Excel practice

MS Excel practice

Professional Development

18 Qs

Gen. Assembly Recap Day 1

Gen. Assembly Recap Day 1

Professional Development

15 Qs

JDBC_Objective_Exam_2

JDBC_Objective_Exam_2

Professional Development

15 Qs

CPA MS-Office Hotkeys Quiz

CPA MS-Office Hotkeys Quiz

8th Grade - Professional Development

21 Qs

KOE034: Sensors and Instruments

KOE034: Sensors and Instruments

Professional Development

11 Qs

Cyber Resilience Training

Cyber Resilience Training

Assessment

Quiz

Computers

Professional Development

Practice Problem

Medium

Created by

Jonathan Thomas

Used 8+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of social engineering?

Impersonating a trusted individual to obtain sensitive information

Uninstalling antivirus software to expose a computer

Stealing someone's login details from a fraudulent email

Guessing a user's weak password

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Anaya is transferring a confidential document to Charlie using a USB stick. To prevent unauthorised access, she uses a cybersecurity practice that involves converting data into a code. What is this practice known as?

Encryption

Decryption

Firewall

Hacking

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of antivirus software?

Detect and remove malware
Encrypt data
Block internet access
Manage passwords

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Oscar is browsing the internet and notices that some websites have a web address starting with "HTTPS". What does "HTTPS" stand for?

HyperText Transfer Protocol Secure

High Traffic Service

Hypertext Transport Protocol

Hyperlink Transfer System

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Evie received an email and suspects it might be a phishing attempt. Which of the following is NOT a common indicator of a phishing email?

Spelling and grammar errors

Generic salutations

Urgent requests for personal information

An email with no links

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a brute-force attack in the context of cybersecurity?

Repeatedly trying all possible password combinations
A type of phishing attack

Use of physical coercion to retrieve data

A social engineering technique

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which cybersecurity practice involves regularly updating software to fix security vulnerabilities?

Patching
Hacking
Decryption
Password cracking

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?