Cyber Security 101

Cyber Security 101

University

10 Qs

quiz-placeholder

Similar activities

CHAPTER 3 : Computer Fraud and Security (SET 1)

CHAPTER 3 : Computer Fraud and Security (SET 1)

University

15 Qs

1. Test Your Skills with our G-Suite Webinar Quiz

1. Test Your Skills with our G-Suite Webinar Quiz

University

15 Qs

Before NSO Survey

Before NSO Survey

University

14 Qs

Google Classroom

Google Classroom

KG - University

10 Qs

Intro to Cybersecurity

Intro to Cybersecurity

University

13 Qs

Means of Communication

Means of Communication

6th Grade - University

11 Qs

MacBook Basics

MacBook Basics

KG - University

10 Qs

TRACK_ELECTIVE F_SW1

TRACK_ELECTIVE F_SW1

University

10 Qs

Cyber Security 101

Cyber Security 101

Assessment

Quiz

Other

University

Medium

Used 265+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Who is responsible for Cyber Security?
Technology Information Security Office
Developers
Government
Everyone

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

When receiving an email from an unknown contact that has a link, you should?
Open the link to view its contents
Report the suspicious email to TISO
Forward the email to your co-workers to allow them to open the link first
Forward the email to your personal email account so you can open it at home

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

How can you tell if a website encrypts its traffic?
 Google it
 Look for the lock symbol in a URL
All websites encrypt their traffic
Encrypted sites take longer to load

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Media Image
If you see a pop-up message like this when you’re on the web, you should: 
Click OK to decide whether it is a legitimate offer
Click Cancel
Press Ctrl + F4 on your keyboard to close it
Click the X button

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following circumstances should you treat as suspicious?
 Flight information attachment from airline when no travel is planned
 Request from Bank with  a link to update information
 Email from unknown sender with an urgent message requiring action
All of the above

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Who are Hackers?
They are benign computer experts
They are malicious computer criminals
Hackers could be both benign computer experts and malicious computer criminals
Investment Bankers

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

These days in the media it is not uncommon to hear that organisations and companies have suffered from cyber-attacks. The popular image is that these attacks are carried out by so-called malicious hackers that are external to an organisation. However several observations show that many of these attacks are carried out by organisation employees/officers or former employees. What is the common name which is given to this latter type of threat?
Ethical hacking
Trolling
Insider Threat
Honeypot

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?