Understanding Cybersecurity's Human Element

Understanding Cybersecurity's Human Element

Professional Development

20 Qs

quiz-placeholder

Similar activities

Sessão 2

Sessão 2

Professional Development

20 Qs

DCP Utilization and Maintenance

DCP Utilization and Maintenance

Professional Development

25 Qs

SOM 1.2-Software y lenguajes

SOM 1.2-Software y lenguajes

Professional Development

22 Qs

cryptography

cryptography

Professional Development

25 Qs

Política de Segurança

Política de Segurança

Professional Development

17 Qs

Cybersecurity Fundamentals for Beginners

Cybersecurity Fundamentals for Beginners

Professional Development

20 Qs

Malware Identification Quiz

Malware Identification Quiz

Professional Development

20 Qs

Pre-Test: Ethical Hacking Basics

Pre-Test: Ethical Hacking Basics

Professional Development

20 Qs

Understanding Cybersecurity's Human Element

Understanding Cybersecurity's Human Element

Assessment

Quiz

Information Technology (IT)

Professional Development

Easy

Created by

Caroline Dukes

Used 1+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common tactic used in social engineering attacks?

Encrypting data

Impersonating a trusted source

Installing antivirus software

Using complex passwords

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a key component of phishing awareness training?

Learning to code

Recognising suspicious emails

Installing hardware

Writing reports

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an insider threat in cybersecurity?

A virus from the internet

A threat from within the organisation

A hacker from another country

A malfunctioning computer

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a best practice for password security?

Using the same password for all accounts

Sharing passwords with colleagues

Using a mix of letters, numbers, and symbols

Writing passwords on a sticky note

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a basic cyber hygiene practice?

Ignoring software updates

Regularly updating software

Disabling firewalls

Using public Wi-Fi for sensitive transactions

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a phishing attack?

A legitimate email from your bank

An email asking for your password to verify your account

A phone call from a friend

A text message from your mobile provider

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you do if you suspect an insider threat?

Ignore it

Report it to your security team

Confront the person directly

Delete all your files

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?