
Cybersecurity Training - Aug 2024
Authored by itat0t3ch itat0t3ch
English
Professional Development
Used 6+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following meet MKS password policy:
The password is at least 14 characters long
The password is at least 8 characters long
The password uses a combination of lowercase, uppercase, number and special characters
The password contains part of your birthday
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How does enabling two-factor authentication (2FA) enhance your account security?
It makes your device new
It requires two password
It sends two emails
It adds an extra layer of security
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What's a phishing attack?
Sending emails for fun
Catching aquatic animals
Stealing sensitive data
Enhancing internet speed
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
If you received a message from an unknown sender with an attachment, what should you do?
A. Investigate by opening and launching the attachment
B. Use phishing report function in Outlook
C. Delete the message
D. Move the message to junk email folder
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What should you do when you accidentally open a link in a suspicious email and your computer starts behaving strangely?
A. Turn it off immediately
B. Disconnect the computer from the network
C. Notify IT
D. All of the above
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
If someone calls you and requests information about your work account, passwords, or personal information about yourself you should:
It's Ok to provide only Password
Do not disclose your credentials to anyone
Information can be provided to known person
Reply to mail with asking for the purpose
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
If you are browsing the internet and suddenly you get a prompt asking you to download a file and run it, what should you do:
A. Download the file and run it
B. Cancel the download and close your web browser
C. Download the file and email it to a co-worker to see if it is legitimate
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?