Search Header Logo

Cybersecurity Quiz

Authored by Patrick Flowers

Computers

University

Used 4+ times

Cybersecurity Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following are ways that an 'identity thief' can obtain someone's credit card numbers and other pieces of identification?

Shoulder surfing at ATM machines
All of these
"Dumpster Diving" from a trash can
Stealing mail from mailboxes

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Let's say you have a credit card which has no balance due on it. You've decided not to use it anymore. No monthly statements show up for it and you don't carry it with you. There is no way an 'identity thief' can get this card's number. True or False?

True
False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which is an act of identity theft?

Receiving permission to use a parents’ credit card for school clothes
Wrongfully acquiring and using someone’s personal identification
Taking the identity of another individual as inspiration for a costume
Having the same name as another person

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

An intentional effort to deceive another individual for personal gain

Mean people
Fake
Fraud
Crime

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Software that is installed on a computing device to prevent viruses from infecting the device.

Antivirus
Firewall
Phishing
Spyware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common tactic used in phishing scams?

Sending personalized emails with legitimate-looking logos and links

Providing free giveaways without any prior interaction

Displaying pop-up ads with flashing colors and loud sounds

Offering unrealistic investment opportunities

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can someone avoid falling victim to a scam?

Click on suspicious links and attachments; provide personal information when asked; use weak passwords.

Ignore suspicious emails and links; visit any website without verifying its legitimacy; use the same password for all accounts.

Open emails from unknown senders; click on any link or attachment; use simple and easily guessable passwords.

Be cautious of suspicious emails, links, and attachments; verify website legitimacy; use strong passwords.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?