
Cyber Security 101
Other
University
Used 265+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Who is responsible for Cyber Security?
Technology Information Security Office
Developers
Government
Everyone
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
When receiving an email from an unknown contact that has a link, you should?
Open the link to view its contents
Report the suspicious email to TISO
Forward the email to your co-workers to allow them to open the link first
Forward the email to your personal email account so you can open it at home
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
How can you tell if a website encrypts its traffic?
Google it
Look for the lock symbol in a URL
All websites encrypt their traffic
Encrypted sites take longer to load
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
If you see a pop-up message like this when you’re on the web, you should:
Click OK to decide whether it is a legitimate offer
Click Cancel
Press Ctrl + F4 on your keyboard to close it
Click the X button
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the following circumstances should you treat as suspicious?
Flight information attachment from airline when no travel is planned
Request from Bank with a link to update information
Email from unknown sender with an urgent message requiring action
All of the above
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Who are Hackers?
They are benign computer experts
They are malicious computer criminals
Hackers could be both benign computer experts and malicious computer criminals
Investment Bankers
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
These days in the media it is not uncommon to hear that organisations and companies have suffered from cyber-attacks. The popular image is that these attacks are carried out by so-called malicious hackers that are external to an organisation. However several observations show that many of these attacks are carried out by organisation employees/officers or former employees. What is the common name which is given to this latter type of threat?
Ethical hacking
Trolling
Insider Threat
Honeypot
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?