Search Header Logo

Cyber Security 101

Other

University

Used 265+ times

Cyber Security 101
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Who is responsible for Cyber Security?

Technology Information Security Office
Developers
Government
Everyone

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

When receiving an email from an unknown contact that has a link, you should?

Open the link to view its contents
Report the suspicious email to TISO
Forward the email to your co-workers to allow them to open the link first
Forward the email to your personal email account so you can open it at home

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

How can you tell if a website encrypts its traffic?

 Google it
 Look for the lock symbol in a URL
All websites encrypt their traffic
Encrypted sites take longer to load

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Media Image

If you see a pop-up message like this when you’re on the web, you should: 

Click OK to decide whether it is a legitimate offer
Click Cancel
Press Ctrl + F4 on your keyboard to close it
Click the X button

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following circumstances should you treat as suspicious?

 Flight information attachment from airline when no travel is planned
 Request from Bank with  a link to update information
 Email from unknown sender with an urgent message requiring action
All of the above

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Who are Hackers?

They are benign computer experts
They are malicious computer criminals
Hackers could be both benign computer experts and malicious computer criminals
Investment Bankers

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

These days in the media it is not uncommon to hear that organisations and companies have suffered from cyber-attacks. The popular image is that these attacks are carried out by so-called malicious hackers that are external to an organisation. However several observations show that many of these attacks are carried out by organisation employees/officers or former employees. What is the common name which is given to this latter type of threat?

Ethical hacking
Trolling
Insider Threat
Honeypot

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?