Search Header Logo
Nine Ways to Stay Safe Online- CISA Lesson

Nine Ways to Stay Safe Online- CISA Lesson

Assessment

Presentation

Computers

Professional Development

Practice Problem

Hard

DOK Level 1: Recall

Standards-aligned

Created by

Sarah Finch

FREE Resource

27 Slides • 17 Questions

1

media

2

media

3

media

4

media

5

Multiple Choice

What are the benefits of implementing cybersecurity best practices?

1

Protecting intellectual property

2

Increasing operational costs

3

Reducing employee productivity

4

Limiting data access

6

media

7

Multiple Select

Question image

Check off all the ways you can make a stronger password:

1

Make it longer than 8 characters

2

Use mixed sets of characters

3

Keep it easy to spell

4

Use only capitals or lowercase

8

media

9

Multiple Choice

Why is it important to update your software and applications regularly?

1

Updates use up unnecessary device storage.

2

Updates are only for changing the interface.

3

Updates fix security vulnerabilities and improve functionality.

4

Updates are a way for companies to charge you more money.

10

media

11

media

12

Reorder

Abigail and Zoe are setting up a website for their new business venture and are discussing the MOST effective method to maintain a high level of password security over time for their admin accounts.

Rank the options below from BEST --> WORST

Employing a reputable password manager to generate and store complex passwords

Choosing passwords that are at least 10 characters long with mixed characters

Regularly changing the password to something they can easily recall

Utilizing the same password across all accounts for consistency

1
2
3
4

13

media

14

Multiple Choice

What are the benefits of using a password manager?

1

Stores your passwords

2

Alerts you of duplicate passwords

3

Generates strong passwords

4

Fills in your login credentials

15

media

16

Multiple Choice

What is the key advantage of multi-factor authentication over single-factor authentication?

1

It is faster

2

It uses only one type of security measure

3

It provides higher security by using multiple verification methods

4

It is less complex

17

media

18

Multiple Choice

Which MFA method provides the best protection against phishing?

1

Security key

2

Authenticator app with number matching

3

Biometrics

4

Text or email code

19

media

20

Multiple Choice

What are some signs that a message may be phishing?

1

Urgent tone

2

Sender email mismatch

3

Unexpected communications

4

All of the above

21

media

22

Multiple Choice

What should you do if you receive an email that you suspect is phishing?

1

Reply to the email asking if it is legitimate.

2

Click on any links to verify their destination.

3

Report the email to your IT department or use the report feature in your email client.

4

Forward the email to your contacts to see if they have received a similar one.

23

media

24

media

25

Multiple Choice

What is logging and monitoring?

1

Logging is the process of recording activity on your business systems.

2

Monitoring adds a layer of oversight by reviewing logs.

3

Together, they create a clear picture of normal behavior.

4

You can quickly detect anything suspicious.

26

Multiple Choice

A security learn implemented a SIEM as part for its security-monitoring program there is a requirement to integrate a number of sources Into the SIEM to provide better context relative to the events being processed. Which of the following BEST describes the result the security learn hopes to accomplish by adding these sources?

1

Data enrichment

2

Continuous integration

3

Machine learning

4

Workflow orchestration

27

Multiple Choice

____________ is an unusual activity in a group of otherwise normal activities.

1

Anomaly

2

Iteration

3

Parameter

4

Precision

28

media

29

media

30

Multiple Choice

Question image

Why is it important for Aria to have a backup of her project data in the context of cybersecurity?

1

To speed up her computer.

2

To have additional copies of the project for sharing with her team.

3

To prevent project data loss in case of a cyber attack.

4

To use more storage space on her computer.

31

media

32

Multiple Choice

What are the best practices for backing up data?

1

3 copies of important files

2

2 different types of storage media

3

1 copy stored off-site

4

All of the above

33

media

34

Multiple Choice

Question image

What is encryption?

1

A person who tricks you into giving your password

2

converting information or data into a code to prevent unauthorized access.

3

To upload your personal data to the cloud

4

When there is a security breach in your data

35

media

36

Multiple Choice

What should you encrypt?

1

All devices and hard drives

2

Only laptops

3

Only removable media

4

Only sensitive data

37

media

38

Multiple Choice

As a member of a Computer Security Incident Response Team (CSIRT), you are involved in collecting data for incident response activities. When the CSIRT is dealing with an advanced persistent threat (APT) targeting your organization, which of the following methods is likely to be particularly useful in gathering information about the threat actor?

1

Analyzing network traffic for signs of command-and-control activity

2

Implementing password changes

3

Increasing cloud storage

4

Disabling firewall rules

39

media

40

media

41

media

42

media

43

media

44

media
media

Show answer

Auto Play

Slide 1 / 44

SLIDE