
Cyber Security Training Part 2 & 3
Authored by Paramita Sari
Computers
Professional Development
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which of the following is a recommended practice for creating strong passwords?
Using easily guessable information like birthdates
Using the same password across multiple accounts
Including a mix of uppercase, lowercase, numbers, and symbols
Sharing passwords with trusted friends and family
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What is two-factor authentication (2FA) used for in account security?
To complicate the login process
To provide an additional layer of security beyond a password
To reset forgotten passwords
To monitor user activity
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
In RBAC, what is the role of an "administrator" typically associated with?
Limited access to system resources
Managing user accounts and permissions
Creating complex passwords
Conducting phishing awareness training
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is Baiting in social engineering?
Use a fabricated story to gain victim’s trust. Pretexting attack can be done online, in person, or over the phone.
Offering something enticing, such as free software, a USB drive or money.
Sending fake emails, messages, or websites that appear legitimate.
Offering something enticing, such as free software, a USB drive or money.
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
In RBAC, what is the purpose of the principle of least privilege?
To grant users the maximum level of access by default
To provide unlimited privileges to all users
To randomly assign access privileges
To restrict users' access rights to the minimum necessary for their roles
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What is a red flag of a potential phishing email?
Urgent language and threats of account closure
Personalized greetings
Requests for regular password changes
Clearly identified sender information
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What is the purpose of data classification?
Deleting unnecessary data
Categorizing data based on its sensitivity and importance
Sharing all data with all users
Ignoring data security measures
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?