Craft Silicon IT Security Awareness Test

Craft Silicon IT Security Awareness Test

Professional Development

18 Qs

quiz-placeholder

Similar activities

Security+

Security+

Professional Development

15 Qs

Fraud in the Banking World

Fraud in the Banking World

Professional Development

13 Qs

Linux, Cisco and Cyber

Linux, Cisco and Cyber

Professional Development

21 Qs

INTELLIGENCE SECURITY QUIZ NO. 1 SET A

INTELLIGENCE SECURITY QUIZ NO. 1 SET A

Professional Development

15 Qs

Assessment on Fundamentals to CI

Assessment on Fundamentals to CI

Professional Development

20 Qs

Travel Picture Dictionary

Travel Picture Dictionary

10th Grade - Professional Development

16 Qs

Cybersecurity Roles in Football Analogy

Cybersecurity Roles in Football Analogy

Professional Development

15 Qs

GUEST SERVICE QUIZ ( SHARVIN )

GUEST SERVICE QUIZ ( SHARVIN )

Professional Development

20 Qs

Craft Silicon IT Security Awareness Test

Craft Silicon IT Security Awareness Test

Assessment

Quiz

Other

Professional Development

Easy

Created by

Ernest Elnino

Used 8+ times

FREE Resource

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What is phishing, and how does it differ from other cyber threats?

A computer virus

Social media manipulation

Deceptive attempts to trick individuals into revealing sensitive information

2.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What are some common tactics used by phishers to manipulate individuals?

Urgency and fear

Positive reinforcement

Entertainment and humour

3.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What are some safe email habits that individuals can adopt to avoid falling victim to phishing?

Click on links from known senders

Download attachments from unfamiliar emails

Verify email sender addresses and avoid clicking on suspicious links

4.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

How can you identify a phishing URL, and why is it crucial to verify website addresses?

Ignore website addresses

Click on any link and assess the website later

Verify URLs by checking for spelling mistakes and using HTTPS

5.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Attackers often use email attachments as a method for phishing. What is the risk associated with opening attachments from unknown or suspicious emails?

No risk, as email attachments are always safe to open

Risk of spreading positive content

Risk of downloading malware or viruses onto your device

6.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

You receive an email from the group CEO, which email would you respond to?

kamal@craftsi1icon.com

kamal@craftsilicon.com

kama1@craftsiIicon.com

kamaI@craftsiIicon.com

7.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Define social engineering and provide examples of how it can be used in cyber attacks.

A type of computer programming that helps protect from cyber attacks

Manipulating individuals to gain confidential information

A form of networking and socialisation

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?