Understanding Cybersecurity's Human Element

Understanding Cybersecurity's Human Element

Professional Development

20 Qs

quiz-placeholder

Similar activities

Cybersecurity Core Functions

Cybersecurity Core Functions

Professional Development

15 Qs

Cyber Security Awareness

Cyber Security Awareness

Professional Development

20 Qs

Microsoft IT Pro Meetup - July

Microsoft IT Pro Meetup - July

Professional Development

15 Qs

Mitre Att&ck Quiz

Mitre Att&ck Quiz

Professional Development

15 Qs

Cybersecurity Test

Cybersecurity Test

Professional Development

20 Qs

Social Engineering Cydex

Social Engineering Cydex

Professional Development

23 Qs

CB-Quiz On AWS_IAM USER

CB-Quiz On AWS_IAM USER

Professional Development

20 Qs

Understanding Cybersecurity's Human Element

Understanding Cybersecurity's Human Element

Assessment

Quiz

Information Technology (IT)

Professional Development

Easy

Created by

Caroline Dukes

Used 1+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common tactic used in social engineering attacks?

Encrypting data

Impersonating a trusted source

Installing antivirus software

Using complex passwords

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a key component of phishing awareness training?

Learning to code

Recognising suspicious emails

Installing hardware

Writing reports

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an insider threat in cybersecurity?

A virus from the internet

A threat from within the organisation

A hacker from another country

A malfunctioning computer

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a best practice for password security?

Using the same password for all accounts

Sharing passwords with colleagues

Using a mix of letters, numbers, and symbols

Writing passwords on a sticky note

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a basic cyber hygiene practice?

Ignoring software updates

Regularly updating software

Disabling firewalls

Using public Wi-Fi for sensitive transactions

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a phishing attack?

A legitimate email from your bank

An email asking for your password to verify your account

A phone call from a friend

A text message from your mobile provider

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you do if you suspect an insider threat?

Ignore it

Report it to your security team

Confront the person directly

Delete all your files

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?