Week 3 Cyber Hygiene Quiz

Week 3 Cyber Hygiene Quiz

Professional Development

10 Qs

quiz-placeholder

Similar activities

Global Handwashing Day

Global Handwashing Day

Professional Development

10 Qs

TCAR - Enf. tejido conectivo

TCAR - Enf. tejido conectivo

Professional Development

10 Qs

26th PHICS Convention KNOCKOUTS 2021

26th PHICS Convention KNOCKOUTS 2021

Professional Development

10 Qs

ISO 13485:2016  Awareness Assessment 2023

ISO 13485:2016 Awareness Assessment 2023

Professional Development

15 Qs

Week 3: User-centred design (UCD)

Week 3: User-centred design (UCD)

Professional Development

15 Qs

QUIZ: WAAW Hospital Kajang 2024

QUIZ: WAAW Hospital Kajang 2024

Professional Development

9 Qs

IC Audit

IC Audit

Professional Development

11 Qs

Week 2 CyberHER Quiz 2

Week 2 CyberHER Quiz 2

Professional Development

10 Qs

Week 3 Cyber Hygiene Quiz

Week 3 Cyber Hygiene Quiz

Assessment

Quiz

Science

Professional Development

Hard

Created by

Nisha Rawindaran

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Clicking on links or attachments in suspicious emails is an example of what?

Safe Browsing

Cyber Hygiene Best Practice

Cyber Hygiene Mistake

Secure Communication

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a common cyber hygiene mistake?

Reusing Passwords

Using Outdated Software

Regularly Updating Software

Not Using Antivirus Software

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you avoid to maintain good cyber hygiene?

Using Strong Passwords

Clicking on Suspicious Links

Regularly Backing Up Data

Using Secure Networks

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a consequence of using unsecured Wi-Fi networks in public places?

Enhanced Security

Data Breach

Improved Performance

Better User Experience

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a good cyber hygiene practice?

Granting Excessive Permissions

Using Outdated Software

Regularly Updating Antivirus Software

Clicking on Suspicious Links

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a potential risk of granting excessive permissions to applications?

Improved Security

Enhanced Performance

Compromised Privacy

Better User Experience

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which component of the ROHAN model emphasizes keeping up to date with the checklist provided by "The Golden Hub"?

Holistic Approach

Ownership

Nurture

Awareness, Adaptation, Assessment

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?