Search Header Logo
CYBER HYGIENE

CYBER HYGIENE

Assessment

Presentation

Information Technology (IT)

KG

Practice Problem

Easy

Created by

MOHD MAIL

Used 1+ times

FREE Resource

31 Slides • 23 Questions

1

media

2

media

3

Multiple Choice

Why is maintaining good cyber hygiene important in today's digital world?

1

It helps protect personal and organizational data from cyber threats.

2

It makes internet browsing faster.

3

It is required by law in all countries.

4

It prevents computer hardware from malfunctioning.

4

media

5

Multiple Choice

Which of the following best describes the concept of cyber hygiene?

1

A set of practices for ensuring the safe handling of data and securing networks

2

A method for cleaning computer hardware

3

A way to organize files on your computer

4

A process for updating software regularly

6

media

7

Multiple Choice

Why is good cyber hygiene considered the #1 defense against common cyber attacks?

1

Because it prevents all types of malware

2

Because most data breaches involve a human element

3

Because it makes technology invulnerable

4

Because attackers only target systems, not people

8

media

9

media

10

Open Ended

Explain how weak, reused, and stolen passwords contribute to security vulnerabilities. Provide examples from the slides.

11

media

12

Open Ended

Compare and contrast strong and weak passwords. Why is it important to use a password manager or passphrase?

13

Multiple Select

Which of the following are characteristics of weak passwords?

1

Easily guessed

2

Reused across multiple accounts

3

Cracked by a program in seconds

4

Contains special characters

14

media

15

Fill in the Blank

Multi-factor authentication (MFA) is the single most effective way to secure your accounts. MFA stands for Multi-___ Authentication.

16

media

17

Multiple Choice

Which of the following is NOT one of the three factors of Multi-Factor Authentication (MFA)?

1

Something You Know

2

Something You Have

3

Something You Are

4

Something You See

18

media

19

media

20

Open Ended

Explain how social engineering can compromise security and why it is considered 'hacking the human, not the computer.'

21

media

22

Multiple Select

Which of the following are common goals of a phishing attack?

1

Steal credentials

2

Install malware

3

Get financial information

4

Improve computer performance

23

media

24

Multiple Select

Which red flags can help you identify a phishing email?

1

Sense of urgency

2

Suspicious sender

3

Spelling/grammar mistakes

4

Personalized greeting

25

Fill in the Blank

A suspicious sender in a phishing email might use an address like ___@login-mail.com.

26

media

27

Multiple Choice

What is the main difference between spear phishing and smishing?

1

Spear phishing targets specific individuals, while smishing uses SMS messages.

2

Smishing targets specific individuals, while spear phishing uses SMS messages.

3

Both use phone calls to trick victims.

4

Both use emails to trick victims.

28

media

29

Open Ended

Have you or someone you know received a phishing email? What were the red flags you noticed?

30

media

31

media

32

Multiple Choice

Which of the following best describes the 3-2-1 backup rule for data security?

1

Keep three copies of your data, on two different media types, with one copy off-site.

2

Keep one copy of your data, on three different media types, with two copies off-site.

3

Keep two copies of your data, on three different media types, with one copy off-site.

4

Keep three copies of your data, all on the same media type, with no off-site backup.

33

media

34

Fill in the Blank

Fill in the blank: Encryption scrambles your data so it's unreadable to anyone without the ___

35

Multiple Select

Which of the following are examples of data-at-rest encryption?

1

BitLocker

2

FileVault

3

HTTPS

4

VPN

36

media

37

Open Ended

List two physical security measures that can help protect your devices in public spaces.

38

media

39

Open Ended

What is a common myth about software updates, and what is the reality?

40

media

41

media

42

Multiple Choice

Which of the following is a major risk of using unsecured public Wi-Fi networks?

1

Slow internet speed

2

Man-in-the-Middle attacks

3

Limited device compatibility

4

High data usage

43

media

44

Fill in the Blank

A VPN creates a secure, encrypted ___ between your device and the internet.

45

Multiple Select

Which of the following are best practices when connecting to public Wi-Fi?

1

Always use a VPN

2

Share sensitive information freely

3

Connect to any available network without checking security

4

Avoid accessing sensitive accounts

46

Open Ended

Explain how a VPN helps protect your data when using public Wi-Fi.

47

media

48

media

49

media

50

media

51

media

52

media

53

media

54

media
media

Show answer

Auto Play

Slide 1 / 54

SLIDE