How Cyber Safe Are You?

How Cyber Safe Are You?

University

10 Qs

quiz-placeholder

Similar activities

Татаал издөө сурамдары

Татаал издөө сурамдары

7th Grade - University

10 Qs

Evaluación Sumativa Taller de Cultura Digital Categoria C

Evaluación Sumativa Taller de Cultura Digital Categoria C

11th Grade - University

10 Qs

LibreOffice Writer Styles Quiz

LibreOffice Writer Styles Quiz

10th Grade - University

15 Qs

Java_MCQ_3

Java_MCQ_3

University

15 Qs

Questionário sobre Inteligência Artificial

Questionário sobre Inteligência Artificial

University

15 Qs

Tecnología Disruptiva en Educación

Tecnología Disruptiva en Educación

12th Grade - University

10 Qs

POST-TEST

POST-TEST

University

10 Qs

DTM - UNIT 1 & 2

DTM - UNIT 1 & 2

University

10 Qs

How Cyber Safe Are You?

How Cyber Safe Are You?

Assessment

Quiz

Information Technology (IT)

University

Practice Problem

Easy

Created by

Crystal Eleanor

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the BEST definition of Cybersecurity?

Cybersecurity is the practice of protecting systems, networks, and data from digital attacks, unauthorized access, and damage.

Cybersecurity is solely focused on preventing hackers from accessing social media accounts.

Cybersecurity involves tracking and monitoring people’s online activity to ensure compliance.

Cybersecurity is the study of programming languages to build secure websites.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following BEST describes phishing?

Phishing is a method of encrypting data to protect it from unauthorized access.

Phishing is a cyberattack where attackers pose as legitimate entities to trick individuals into revealing sensitive information.

Phishing is a method hackers use to gain physical access to a restricted area by tricking security personnel.

Phishing is an email filtering system designed to block spam messages.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cybercriminal illegally accesses a computer, encrypts the user's files and data, and demands a ransom for the user to regain access. What is this practice called?

Spyware

Phishing

Ransomware

Baiting

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What social engineering tactic uses SMS to trick individuals into disclosing sensitive information?

Quid Pro Quo

Vishing

Spear phishing

Smishing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a firewall in cybersecurity?

To monitor and control incoming and outgoing network traffic based on predetermined security rules.

To encrypt sensitive data during transmission over the internet.

To perform regular backups of all user data to prevent loss.

To remove malware from devices connected to the network.

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following demonstrates cyber-safe behavior? (Select TWO that apply)

Clicking on links in unsolicited emails.

Using 2FA on important accounts.

Regularly updating software and security applications.

Sharing personal information on social media.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A typical ransom note from ransomware often include:

Contact details for technical support.

A list of free recovery options.

Advice on updating software.

Instructions on how to pay the ransom and recover the encrypted files.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?