How Cyber Safe Are You? Part 2

How Cyber Safe Are You? Part 2

Professional Development

10 Qs

quiz-placeholder

Similar activities

cyber Security Awareness

cyber Security Awareness

Professional Development

15 Qs

Knowing the Cyber Threat

Knowing the Cyber Threat

Professional Development

6 Qs

Cybersecurity Core Functions

Cybersecurity Core Functions

Professional Development

15 Qs

Cybersecurity fun quiz

Cybersecurity fun quiz

Professional Development

11 Qs

CDAC - Password Cracking

CDAC - Password Cracking

Professional Development

10 Qs

Product Updates

Product Updates

Professional Development

10 Qs

VMware and ASP Update Procedures

VMware and ASP Update Procedures

Professional Development

11 Qs

Cyber Security

Cyber Security

Professional Development

10 Qs

How Cyber Safe Are You? Part 2

How Cyber Safe Are You? Part 2

Assessment

Quiz

Information Technology (IT)

Professional Development

Medium

Created by

Crystal Eleanor

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you do if you are unsure whether a link in an email is safe to click?

Just click it anyway and see what happens.

Trust your gut and open the link to check.

Hover your mouse over the link to preview where it leads before clicking.

Send the link to a friend or coworker to see what they think.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In cybersecurity, what is the main function of a firewall?

Scans your system and eliminates viruses.

Blocks unauthorized access to or from a private network.

Encrypts sensitive data while it's being sent.

Monitors and records a user's online behaviour.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you do first if you think your computer might be infected with malware?

Disconnect from the internet and hope the issue resolves on its own.

Quickly install more antivirus software without checking the source.

Use trusted antivirus software or contact a cybersecurity expert to scan and remove the malware.

Post about the issue on social media to see if anyone can help.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a social engineering attack?

Installing antivirus software to protect your device.

Pretending to be IT support to trick someone into giving up their password.

Configuring a firewall to secure a network.

Performing regular updates to keep software secure.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Tom gets a call from someone claiming to be from the IT department. They say there’s a problem with his account and ask for his login details to “fix it remotely.” The caller sounds professional and even knows his name and job title.

 

What should Tom do?

Give his login info to resolve the issue quickly.

Hang up and report the incident to the real IT department.

Ask for their name and call them back later.

Share only his username, not his password.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Jake connects to free Wi-Fi at a mall. Before gaining access, he’s redirected to a login page asking for his email and password. He fills it out. Later, he finds out someone tried logging into his social media accounts.

 

What kind of attack did Jake fall for?

Phishing via a fake login page on a public network.

Password reset attack.

Adware infection from an app.

SIM card cloning.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When are phishing attacks most likely to increase in frequency?

During festive or holiday seasons.

Late at night or during midnight hours.

Only on weekends.

Early in the morning, around breakfast time.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?