Cyber Security Training Part 2 & 3

Cyber Security Training Part 2 & 3

Professional Development

10 Qs

quiz-placeholder

Similar activities

AWS Security Clase 5

AWS Security Clase 5

Professional Development

8 Qs

Cyber Security Quiz

Cyber Security Quiz

Professional Development

10 Qs

Cybersecurity Quiz 1

Cybersecurity Quiz 1

Professional Development

10 Qs

SOF Day 1 Review

SOF Day 1 Review

Professional Development

12 Qs

Class 4 Cycle 4

Class 4 Cycle 4

Professional Development

8 Qs

ITF - Quiz 14.1 - Access Controls

ITF - Quiz 14.1 - Access Controls

Professional Development

14 Qs

G-AsiaPacific Cloud Knowledge Challenge: AWS Edition

G-AsiaPacific Cloud Knowledge Challenge: AWS Edition

Professional Development

15 Qs

Understanding Cybersecurity

Understanding Cybersecurity

5th Grade - Professional Development

10 Qs

Cyber Security Training Part 2 & 3

Cyber Security Training Part 2 & 3

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Paramita Sari

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is a recommended practice for creating strong passwords?

Using easily guessable information like birthdates

Using the same password across multiple accounts

Including a mix of uppercase, lowercase, numbers, and symbols

Sharing passwords with trusted friends and family

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is two-factor authentication (2FA) used for in account security?

To complicate the login process

To provide an additional layer of security beyond a password

To reset forgotten passwords

To monitor user activity

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

In RBAC, what is the role of an "administrator" typically associated with?

Limited access to system resources

Managing user accounts and permissions

Creating complex passwords

Conducting phishing awareness training

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Baiting in social engineering?

Use a fabricated story to gain victim’s trust. Pretexting attack can be done online, in person, or over the phone.

Offering something enticing, such as free software, a USB drive or money.

Sending fake emails, messages, or websites that appear legitimate.

Offering something enticing, such as free software, a USB drive or money.

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

In RBAC, what is the purpose of the principle of least privilege?

To grant users the maximum level of access by default

To provide unlimited privileges to all users

To randomly assign access privileges

To restrict users' access rights to the minimum necessary for their roles

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a red flag of a potential phishing email?

Urgent language and threats of account closure

Personalized greetings

Requests for regular password changes

Clearly identified sender information

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the purpose of data classification?

Deleting unnecessary data

Categorizing data based on its sensitivity and importance

Sharing all data with all users

Ignoring data security measures

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?