Cybersecurity Assessment

Cybersecurity Assessment

Professional Development

8 Qs

quiz-placeholder

Similar activities

Cybersecurity

Cybersecurity

Professional Development

10 Qs

Windows Updates

Windows Updates

9th Grade - Professional Development

8 Qs

Unit 8: Computers and Internet Safety

Unit 8: Computers and Internet Safety

Professional Development

10 Qs

Cyber quiz

Cyber quiz

Professional Development

10 Qs

Connecting to a Database using PHP

Connecting to a Database using PHP

Professional Development

9 Qs

Windows 11

Windows 11

1st Grade - Professional Development

10 Qs

Atrnet security quiz

Atrnet security quiz

Professional Development

9 Qs

Digital Skills

Digital Skills

Professional Development

10 Qs

Cybersecurity Assessment

Cybersecurity Assessment

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Lindsey Grow

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Najmo created a password with her name and her favorite sport.  Her password is NajmoSoccer.  Why should Najmo choose a different password?
It's too long.
It uses her name.
It uses her name and doesn't use symbols or numbers.

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A strong password is better with;
A simple password based on interests.
A password no one would relate to you but you can remember.
A complicated password you may forget.
A combination of letters, numbers & special characters

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is an example of a secure password?

Bailey123

Pl@Yn!ce529

Password1

admin83

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A secure password should include:

your name

pet's name

a date

passphrases

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What should you look for to determine if an email is a phishing scam? Choose all that apply

suspicious links

trustworthy vs. unfamiliar sender

the date it was sent

language such as "urgent" or "immediately"

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Is this a possible phishing email?

Yes

No

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which are actions that can lead to an insider threat? Choose all that apply.

Downloading classified information onto a personal device

Asking a coworker for help

sharing credentials

Sharing information in a meeting

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False: An insider threat can happen unintentionally.

True

False