Cyber Security 101

Cyber Security 101

University

10 Qs

quiz-placeholder

Similar activities

Digital Marketing - Assignment 02

Digital Marketing - Assignment 02

University

10 Qs

Chapter 5

Chapter 5

University

10 Qs

[Odoo-2 2022] CRM

[Odoo-2 2022] CRM

University - Professional Development

15 Qs

WK07 Communication

WK07 Communication

University - Professional Development

10 Qs

Introduction to Digital Marketing

Introduction to Digital Marketing

University

15 Qs

WRITTEN  COMMUNICATION

WRITTEN COMMUNICATION

University

10 Qs

Certified Ethical Hacker 2

Certified Ethical Hacker 2

University

10 Qs

ECOMMERCE MIDTERM

ECOMMERCE MIDTERM

University

11 Qs

Cyber Security 101

Cyber Security 101

Assessment

Quiz

Other

University

Medium

Used 265+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Who is responsible for Cyber Security?
Technology Information Security Office
Developers
Government
Everyone

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

When receiving an email from an unknown contact that has a link, you should?
Open the link to view its contents
Report the suspicious email to TISO
Forward the email to your co-workers to allow them to open the link first
Forward the email to your personal email account so you can open it at home

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

How can you tell if a website encrypts its traffic?
 Google it
 Look for the lock symbol in a URL
All websites encrypt their traffic
Encrypted sites take longer to load

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Media Image
If you see a pop-up message like this when you’re on the web, you should: 
Click OK to decide whether it is a legitimate offer
Click Cancel
Press Ctrl + F4 on your keyboard to close it
Click the X button

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following circumstances should you treat as suspicious?
 Flight information attachment from airline when no travel is planned
 Request from Bank with  a link to update information
 Email from unknown sender with an urgent message requiring action
All of the above

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Who are Hackers?
They are benign computer experts
They are malicious computer criminals
Hackers could be both benign computer experts and malicious computer criminals
Investment Bankers

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

These days in the media it is not uncommon to hear that organisations and companies have suffered from cyber-attacks. The popular image is that these attacks are carried out by so-called malicious hackers that are external to an organisation. However several observations show that many of these attacks are carried out by organisation employees/officers or former employees. What is the common name which is given to this latter type of threat?
Ethical hacking
Trolling
Insider Threat
Honeypot

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?