Cyber Resilience Training

Cyber Resilience Training

Professional Development

16 Qs

quiz-placeholder

Similar activities

0309 MF3-UF1 Tema 3-2

0309 MF3-UF1 Tema 3-2

Professional Development

20 Qs

PSSE Icebreaker

PSSE Icebreaker

University - Professional Development

20 Qs

copias de seguridad en windows

copias de seguridad en windows

Professional Development

20 Qs

ITF+ Ch10, Security Best Practices

ITF+ Ch10, Security Best Practices

Professional Development

20 Qs

Día de Internet Segura

Día de Internet Segura

Professional Development

21 Qs

HP 6J Final Assessment

HP 6J Final Assessment

Professional Development

20 Qs

OPS Common Sharing Services With Business

OPS Common Sharing Services With Business

Professional Development

13 Qs

R&D Days

R&D Days

Professional Development

15 Qs

Cyber Resilience Training

Cyber Resilience Training

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Jonathan Thomas

Used 7+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of social engineering?

Impersonating a trusted individual to obtain sensitive information

Uninstalling antivirus software to expose a computer

Stealing someone's login details from a fraudulent email

Guessing a user's weak password

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Anaya is transferring a confidential document to Charlie using a USB stick. To prevent unauthorised access, she uses a cybersecurity practice that involves converting data into a code. What is this practice known as?

Encryption

Decryption

Firewall

Hacking

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of antivirus software?
Detect and remove malware
Encrypt data
Block internet access
Manage passwords

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Oscar is browsing the internet and notices that some websites have a web address starting with "HTTPS". What does "HTTPS" stand for?

HyperText Transfer Protocol Secure

High Traffic Service

Hypertext Transport Protocol

Hyperlink Transfer System

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Evie received an email and suspects it might be a phishing attempt. Which of the following is NOT a common indicator of a phishing email?

Spelling and grammar errors

Generic salutations

Urgent requests for personal information

An email with no links

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a brute-force attack in the context of cybersecurity?
Repeatedly trying all possible password combinations
A type of phishing attack

Use of physical coercion to retrieve data

A social engineering technique

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which cybersecurity practice involves regularly updating software to fix security vulnerabilities?
Patching
Hacking
Decryption
Password cracking

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?