
Nine Ways to Stay Safe Online- CISA Lesson
Presentation
•
Computers
•
Professional Development
•
Practice Problem
•
Hard
Standards-aligned
Sarah Finch
FREE Resource
27 Slides • 17 Questions
1
2
3
4
5
Multiple Choice
What are the benefits of implementing cybersecurity best practices?
Protecting intellectual property
Increasing operational costs
Reducing employee productivity
Limiting data access
6
7
Multiple Select
Check off all the ways you can make a stronger password:
Make it longer than 8 characters
Use mixed sets of characters
Keep it easy to spell
Use only capitals or lowercase
8
9
Multiple Choice
Why is it important to update your software and applications regularly?
Updates use up unnecessary device storage.
Updates are only for changing the interface.
Updates fix security vulnerabilities and improve functionality.
Updates are a way for companies to charge you more money.
10
11
12
Reorder
Abigail and Zoe are setting up a website for their new business venture and are discussing the MOST effective method to maintain a high level of password security over time for their admin accounts.
Rank the options below from BEST --> WORST
Employing a reputable password manager to generate and store complex passwords
Choosing passwords that are at least 10 characters long with mixed characters
Regularly changing the password to something they can easily recall
Utilizing the same password across all accounts for consistency
13
14
Multiple Choice
What are the benefits of using a password manager?
Stores your passwords
Alerts you of duplicate passwords
Generates strong passwords
Fills in your login credentials
15
16
Multiple Choice
What is the key advantage of multi-factor authentication over single-factor authentication?
It is faster
It uses only one type of security measure
It provides higher security by using multiple verification methods
It is less complex
17
18
Multiple Choice
Which MFA method provides the best protection against phishing?
Security key
Authenticator app with number matching
Biometrics
Text or email code
19
20
Multiple Choice
What are some signs that a message may be phishing?
Urgent tone
Sender email mismatch
Unexpected communications
All of the above
21
22
Multiple Choice
What should you do if you receive an email that you suspect is phishing?
Reply to the email asking if it is legitimate.
Click on any links to verify their destination.
Report the email to your IT department or use the report feature in your email client.
Forward the email to your contacts to see if they have received a similar one.
23
24
25
Multiple Choice
What is logging and monitoring?
Logging is the process of recording activity on your business systems.
Monitoring adds a layer of oversight by reviewing logs.
Together, they create a clear picture of normal behavior.
You can quickly detect anything suspicious.
26
Multiple Choice
A security learn implemented a SIEM as part for its security-monitoring program there is a requirement to integrate a number of sources Into the SIEM to provide better context relative to the events being processed. Which of the following BEST describes the result the security learn hopes to accomplish by adding these sources?
Data enrichment
Continuous integration
Machine learning
Workflow orchestration
27
Multiple Choice
____________ is an unusual activity in a group of otherwise normal activities.
Anomaly
Iteration
Parameter
Precision
28
29
30
Multiple Choice
Why is it important for Aria to have a backup of her project data in the context of cybersecurity?
To speed up her computer.
To have additional copies of the project for sharing with her team.
To prevent project data loss in case of a cyber attack.
To use more storage space on her computer.
31
32
Multiple Choice
What are the best practices for backing up data?
3 copies of important files
2 different types of storage media
1 copy stored off-site
All of the above
33
34
Multiple Choice
What is encryption?
A person who tricks you into giving your password
converting information or data into a code to prevent unauthorized access.
To upload your personal data to the cloud
When there is a security breach in your data
35
36
Multiple Choice
What should you encrypt?
All devices and hard drives
Only laptops
Only removable media
Only sensitive data
37
38
Multiple Choice
As a member of a Computer Security Incident Response Team (CSIRT), you are involved in collecting data for incident response activities. When the CSIRT is dealing with an advanced persistent threat (APT) targeting your organization, which of the following methods is likely to be particularly useful in gathering information about the threat actor?
Analyzing network traffic for signs of command-and-control activity
Implementing password changes
Increasing cloud storage
Disabling firewall rules
39
40
41
42
43
44
Show answer
Auto Play
Slide 1 / 44
SLIDE
Similar Resources on Wayground
39 questions
Konsep Dasar Algoritma
Presentation
•
University
39 questions
Gamification Lesson B2
Presentation
•
University
38 questions
Zawody przyszłości w IT - Test na testera
Presentation
•
University
38 questions
Stereotype, Bias, Discrimination, and Prejudice
Presentation
•
University
40 questions
Topic 8 Multimedia Network Communication
Presentation
•
University
38 questions
System Implementation
Presentation
•
University
36 questions
บทที่ 1 ความรู้พื้นฐานการจัดการข้อมูลขนาดใหญ่
Presentation
•
KG - University
40 questions
Introduction to Invention & Innovation
Presentation
•
University - Professi...
Popular Resources on Wayground
20 questions
STAAR Review Quiz #3
Quiz
•
8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
6 questions
Marshmallow Farm Quiz
Quiz
•
2nd - 5th Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
20 questions
Inferences
Quiz
•
4th Grade
19 questions
Classifying Quadrilaterals
Quiz
•
3rd Grade
12 questions
What makes Nebraska's government unique?
Quiz
•
4th - 5th Grade