IPF Women CyberSecurity Quiz
Quiz
•
Professional Development
•
Professional Development
•
Practice Problem
•
Medium
GIRISH KRISHNA
Used 2+ times
FREE Resource
Enhance your content in a minute
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which one of the following describes spam message?
Gathering information about a person or organisation without their knowledge.
Performing an unauthorised, usually malicious, action such as erasing files.
Sending unwanted bulk messages.
Putting unnecessary load on the network by making copies of files.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A hacker locks out users and encrypts their personal computer files and data, holding it hostage until they agree to pay to the attacker. What is this practice called?
Browser hijacker
Ransomware
Brute-force
Worm
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which one of the following describes why it is important to update antivirus software regularly?
To protect your computer from all known computer viruses.
To ensure the software identifies old viruses.
To protect your computer from unwanted bulk messages.
To prevent the spread of malicious programs on the Internet.
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which one of the following is MOST likely to be a hoax?
An email from a friend you have not seen recently.
An email with an attachment sent by a colleague using their personal email address.
An email asking you to go to a website for a free computer scan.
An email advertisement from a local shop you subscribe to.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which one of the following statements about a password is TRUE?
It must be changed only if it is compromised.
It cannot contain special character symbols.
It must be registered with the system administrator.
It should be changed regularly
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which one of the following an unsafe online activity?
Using a screen name or nick name that cannot identify you.
Meeting someone you met online face-to-face in the company of your parents.
Keeping your social network profile private.
Giving your home address to someone you met in a public online chat room.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following is a common example of a "phishing" attack?
You receive an email from an acquaintance who you are rarely in contact with that contains only a web link.
You got an email that appears to be from your bank asking you to enter your account number and password, but the web address looks unfamiliar.
You received a text message claiming that you won a contest and asking you to click on the link.
All of the above
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
11 questions
L'encaissement et la prise de congé
Quiz
•
Professional Development
10 questions
INTRODUÇÃO AOS PROCESSOS DE SOLDAGEM
Quiz
•
Professional Development
12 questions
ECG
Quiz
•
University - Professi...
10 questions
Heures de conduite et de repos
Quiz
•
Professional Development
15 questions
Google Nivel 1 7-9
Quiz
•
Professional Development
10 questions
Operate Scissor Lift
Quiz
•
Professional Development
15 questions
[POST TEST] BRAND OVERVIEW- MT Area Feronia
Quiz
•
Professional Development
15 questions
Pretest Workshop Pengelolaan Kinerja PMM
Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Forest Self-Management
Lesson
•
1st - 5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
30 questions
Thanksgiving Trivia
Quiz
•
9th - 12th Grade
30 questions
Thanksgiving Trivia
Quiz
•
6th Grade
11 questions
Would You Rather - Thanksgiving
Lesson
•
KG - 12th Grade
48 questions
The Eagle Way
Quiz
•
6th Grade
10 questions
Identifying equations
Quiz
•
KG - University
10 questions
Thanksgiving
Lesson
•
5th - 7th Grade
