Risk Quiz

Risk Quiz

Professional Development

10 Qs

quiz-placeholder

Similar activities

QUIZ RENEWAL CERTIFICATION SM - BATCH 1

QUIZ RENEWAL CERTIFICATION SM - BATCH 1

Professional Development

10 Qs

Brawl Stars

Brawl Stars

KG - Professional Development

14 Qs

Indian Culture

Indian Culture

Professional Development

10 Qs

E6F Unit 5 - An Interim Solution

E6F Unit 5 - An Interim Solution

Professional Development

10 Qs

Практическая№5 автономка

Практическая№5 автономка

Professional Development

12 Qs

PowerPoint IMiL Quiz

PowerPoint IMiL Quiz

Professional Development

13 Qs

Quiz Refreshment Training SA Toyota

Quiz Refreshment Training SA Toyota

Professional Development

10 Qs

Facebook marketing

Facebook marketing

Professional Development

12 Qs

Risk Quiz

Risk Quiz

Assessment

Quiz

Other

Professional Development

Practice Problem

Medium

Created by

Haseena Usman

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What information should you avoid posting to your LinkedIn profile to prevent yourself becoming a victim of social engineering? Select all that apply.

Job title

Department name

Applications supported

Phone number

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In what situation is it permissible to insert a USB thumb drive into your work laptop?

It isn’t, ever

When you have scanned it for viruses and confirmed there is no issue

When Bill Winters asks you to

When you have the authority to do so

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Its safe to click on any link in an email that asks for your personal information

True 

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you do if you suspect an email may be a phishing attempt

Ignore it

Delete it

Report it

All the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is vishing

A type of phishing attack that uses voice messages

A type of phishing attack that uses emails

A type of phishing attack that uses social engineering

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is considered an element of cyber security

Network security

Operational security

Application security

All the above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malware stands for 

Multipurpose software

Malfunctional software

Malicious software

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?