Cyber Security 101

Cyber Security 101

University

10 Qs

quiz-placeholder

Similar activities

Chapter 10

Chapter 10

KG - University

12 Qs

Webinar 10 items Quiz

Webinar 10 items Quiz

University

10 Qs

Data Security and Theft Quiz

Data Security and Theft Quiz

University

10 Qs

ICT Exam Questions

ICT Exam Questions

University

15 Qs

Unit 9: The Use of Technology in Administration and Supervision

Unit 9: The Use of Technology in Administration and Supervision

University

15 Qs

Tutorial 8 Security

Tutorial 8 Security

University

15 Qs

Cybersecurity Quiz

Cybersecurity Quiz

University

10 Qs

Email Etiquette

Email Etiquette

University

10 Qs

Cyber Security 101

Cyber Security 101

Assessment

Quiz

Other

University

Medium

Used 265+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Who is responsible for Cyber Security?
Technology Information Security Office
Developers
Government
Everyone

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

When receiving an email from an unknown contact that has a link, you should?
Open the link to view its contents
Report the suspicious email to TISO
Forward the email to your co-workers to allow them to open the link first
Forward the email to your personal email account so you can open it at home

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

How can you tell if a website encrypts its traffic?
 Google it
 Look for the lock symbol in a URL
All websites encrypt their traffic
Encrypted sites take longer to load

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Media Image
If you see a pop-up message like this when you’re on the web, you should: 
Click OK to decide whether it is a legitimate offer
Click Cancel
Press Ctrl + F4 on your keyboard to close it
Click the X button

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following circumstances should you treat as suspicious?
 Flight information attachment from airline when no travel is planned
 Request from Bank with  a link to update information
 Email from unknown sender with an urgent message requiring action
All of the above

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Who are Hackers?
They are benign computer experts
They are malicious computer criminals
Hackers could be both benign computer experts and malicious computer criminals
Investment Bankers

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

These days in the media it is not uncommon to hear that organisations and companies have suffered from cyber-attacks. The popular image is that these attacks are carried out by so-called malicious hackers that are external to an organisation. However several observations show that many of these attacks are carried out by organisation employees/officers or former employees. What is the common name which is given to this latter type of threat?
Ethical hacking
Trolling
Insider Threat
Honeypot

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?