Cybersecurity

Cybersecurity

Professional Development

10 Qs

quiz-placeholder

Similar activities

M365 Security Pillar 1 (Identity & Access Management)

M365 Security Pillar 1 (Identity & Access Management)

Professional Development

10 Qs

Security 4/22

Security 4/22

Professional Development

11 Qs

Be Wary of Phishing

Be Wary of Phishing

Professional Development

10 Qs

OWASP Top 10

OWASP Top 10

Professional Development

10 Qs

Security Awareness

Security Awareness

Professional Development

5 Qs

Monday Briefing Cybersecurity

Monday Briefing Cybersecurity

Professional Development

10 Qs

Cyber Security - Basics

Cyber Security - Basics

Professional Development

7 Qs

Cyber Security

Cyber Security

Professional Development

10 Qs

Cybersecurity

Cybersecurity

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Urs Schild

Used 428+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The implementation of which security method has the greatest positive influence on security?

Mature Identity & Access Management

Implementation of strong password guidelines & password management

Application of Secure Coding Methods

Holistic People Powered Security in the organisation

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the biggest cyber security threat?

The human factor

Malware of any kind

Unencrypted communication

Theft of mobile devices

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What measures can be taken to minimize the attack surface for social engineering?

Use of password managers

Encryption of all communication and data

Work exclusively in a secure environment

Minimizing the communication of personal information

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which password is most secure?

LO4ndon7

#fr41963§

%27T#wbZ3

LondonattheThames2019

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the consequences of a virus?

It is destroying your screen.

It opens your e-mail account

It deletes/copies data

It will help you work.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Generic term for all methods used to spy on passwords.

Cyber Grooming

Information Diving

Phishing

Clustering

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Someone's trying to gain access to a computer network.

Cyber Grooming

Information Diving

Pretexting

Hacking

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?