MDCC Cyber Security Training Quiz 2

MDCC Cyber Security Training Quiz 2

University

7 Qs

quiz-placeholder

Similar activities

Website language

Website language

University

10 Qs

CSF Week 2

CSF Week 2

University

10 Qs

Password Safety & Security

Password Safety & Security

KG - Professional Development

11 Qs

Work Online Quiz

Work Online Quiz

University

10 Qs

PROLAK & WEB HELPDESK

PROLAK & WEB HELPDESK

University - Professional Development

10 Qs

ITBP301_Chapter 06

ITBP301_Chapter 06

University

10 Qs

Internet Saftety and Use - ESL Class

Internet Saftety and Use - ESL Class

University

11 Qs

Initial Assessment - Cybersecurity Awareness

Initial Assessment - Cybersecurity Awareness

9th Grade - Professional Development

10 Qs

MDCC Cyber Security Training Quiz 2

MDCC Cyber Security Training Quiz 2

Assessment

Quiz

Computers, Instructional Technology

University

Hard

Created by

Torrey Moore

Used 12+ times

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

This is a type of attack where the bad guys attempt to trick you into revealing personal information through text messages.

Sniffing

Smishing

Hacking

Texting

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

This term refers to a social engineering technique where an unauthorized individual gains physical entry into a building or room by closely following behind someone who is authorized.

Sneaking

Tailgating

Tag Teaming

Hatch backing

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

You are on vacation and your manager calls, asking for your password to get an urgently needed file. What should you do?

Give your password over the phone since this is an urgent request.

Hang up and call your manager back to make sure to make sure the request is legitimate.

Email your password to your manager to make sure no one overhears it.

Remind your manager of organization password policies and procedures.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following passwords is most secure?

mdcc1927!@#$%

Trojans are the greatest

MdccTrojans!(@&1927

Mdcctrojans

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

I opened an unknown attachment in an email message and strange windows flickered on the screen. What should I do?

Restart the system; that should fix the problem.

Contact the sender of the email and tell them about the problem.

Contact IT about the email and tell them about the problem.

Delete the email and empty the system trash can.

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Why should you use a virtual private network (VPN) when connecting to public Wifi?

So no one can see your screen.

Because it provides 100% security.

To prevent someone from intercepting you connection and stealing data.

Because it makes your connection stronger and faster.

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

How do social engineers successfully manipulate people? Choose all that apply.

By collecting personal information found on public forums like social media.

By following closely behind real employees as they enter the building.

By impersonating members of our organization, such as the IT department.

By planting malicious USB flash drives around our organizations.