How Cyber Safe Are You? Part 3

How Cyber Safe Are You? Part 3

Professional Development

10 Qs

quiz-placeholder

Similar activities

Email Security (Pre)

Email Security (Pre)

Professional Development

6 Qs

Technical Knowledge

Technical Knowledge

Professional Development

11 Qs

HTML Quiz

HTML Quiz

Professional Development

10 Qs

Digital Media Marketing Quiz 01

Digital Media Marketing Quiz 01

Professional Development

15 Qs

DBMS Q2 S2

DBMS Q2 S2

Professional Development

15 Qs

Know your processes

Know your processes

Professional Development

9 Qs

701 Security Plus Mega Challenge 3

701 Security Plus Mega Challenge 3

Professional Development

11 Qs

Cyber security

Cyber security

Professional Development

6 Qs

How Cyber Safe Are You? Part 3

How Cyber Safe Are You? Part 3

Assessment

Quiz

Information Technology (IT)

Professional Development

Easy

Created by

Crystal Eleanor

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is it important to be cautious about phishing emails?

To keep yourself safe and secure online.

To protect your personal information and identity.

To avoid falling for scams or being tricked.

All of the answers.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common red flag that may indicate a phishing email?

The message comes from a familiar and trusted contact.

The email starts with a generic greeting.

The email asks for confidential or sensitive information.

The sender marks the email as “important”.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Emma receives an email that says she’s won a RM100 gift card. To claim it, she must click a link and enter her work email login. The email looks like it's from a well-known store and even uses the company logo.

 

What should Emma do?

Click the link and enter her details to claim the prize.

Forward the email to her friends to let them win too.

Report the email as phishing and delete it.

Respond to the sender asking for more info.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which action is the best way to protect yourself from social engineering scams?

Avoid responding to messages that seem suspicious.

Sharing personal details only with people you trust.

Clicking on links in emails from unknown senders.

Entering your password when asked by unfamiliar websites.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Jake uses the same password “Jake123!” for his email, social media, and multiple work accounts. One day, his social media gets hacked, and soon after, his work email is also compromised.

 

What mistake did Jake make that increased his risk?

He used a password with numbers and a symbol.

He did not update his browser regularly.

He reused the same password across multiple accounts.

He turned on two-factor authentication.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Emily posts a birthday countdown and shares a “fun facts about me” quiz on social media, revealing her pet’s name, favourite colour, and the name of her elementary school.

 

What risk is Emily exposing herself to?

Making her profile more engaging to friends.

Sharing useful information for security questions hackers might use.

Helping marketers personalize ads.

Risking physical theft of her identity documents.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one is a legitimate URL?

http://www.bnrn.gov.my/

https://facebok.com/

https://sarawak.gov.my/

https://mybayarrmpgov.my/

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?