
Cybersecurity
Authored by Urs Schild
Computers
Professional Development
Used 496+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The implementation of which security method has the greatest positive influence on security?
Mature Identity & Access Management
Implementation of strong password guidelines & password management
Application of Secure Coding Methods
Holistic People Powered Security in the organisation
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the biggest cyber security threat?
The human factor
Malware of any kind
Unencrypted communication
Theft of mobile devices
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What measures can be taken to minimize the attack surface for social engineering?
Use of password managers
Encryption of all communication and data
Work exclusively in a secure environment
Minimizing the communication of personal information
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which password is most secure?
LO4ndon7
#fr41963§
%27T#wbZ3
LondonattheThames2019
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are the consequences of a virus?
It is destroying your screen.
It opens your e-mail account
It deletes/copies data
It will help you work.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Generic term for all methods used to spy on passwords.
Cyber Grooming
Information Diving
Phishing
Clustering
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Someone's trying to gain access to a computer network.
Cyber Grooming
Information Diving
Pretexting
Hacking
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?