Cyber Security Awareness Quiz

Cyber Security Awareness Quiz

University

20 Qs

quiz-placeholder

Similar activities

Email History

Email History

6th Grade - University

20 Qs

SkillsFuture for Digital Workplace

SkillsFuture for Digital Workplace

University

15 Qs

Cyber EOP - Security Policies By Mr. B

Cyber EOP - Security Policies By Mr. B

12th Grade - University

18 Qs

Computer Security Risk

Computer Security Risk

11th Grade - University

16 Qs

Week 14 - Module 5 Unit 5 Behavioral Security Concepts

Week 14 - Module 5 Unit 5 Behavioral Security Concepts

University

18 Qs

Computer Security Risk

Computer Security Risk

12th Grade - University

16 Qs

E-safety

E-safety

6th Grade - Professional Development

15 Qs

security best practices

security best practices

10th Grade - University

20 Qs

Cyber Security Awareness Quiz

Cyber Security Awareness Quiz

Assessment

Quiz

Computers

University

Easy

Created by

Kwasi Boafo-Asante

Used 1+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common sign of a phishing email?

The email comes from a known contact and contains no links

The email urges immediate action and contains suspicious links

The email is written in perfect English with no errors

The email contains only an attached image

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of malware analysis?

To create new viruses

To understand how malicious software operates and spreads

To delete files from a computer

To speed up computer performance

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a step in the incident handling process?

Preparation

Detection and analysis

Ignoring the incident

Containment, eradication, and recovery

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main function of a firewall in network security?

To increase internet speed

To block unauthorised access to or from a private network

To store backup data

To monitor employee productivity

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If a company experiences a data breach, what should be the first step in response?

Notify the media immediately

Identify and contain the breach

Delete all affected data

Ignore the incident

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a phishing attempt?

A text message from your bank asking you to confirm your account details via a link

A phone call from a friend

A letter from your school

A legitimate email from your employer

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware is designed to demand payment to restore access to your files?

Spyware

Ransomware

Adware

Rootkit

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?