Search Header Logo

MDCC Cyber Security Training Quiz 2

Authored by Torrey Moore

Computers, Instructional Technology

University

Used 12+ times

MDCC Cyber Security Training Quiz 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

This is a type of attack where the bad guys attempt to trick you into revealing personal information through text messages.

Sniffing

Smishing

Hacking

Texting

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

This term refers to a social engineering technique where an unauthorized individual gains physical entry into a building or room by closely following behind someone who is authorized.

Sneaking

Tailgating

Tag Teaming

Hatch backing

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

You are on vacation and your manager calls, asking for your password to get an urgently needed file. What should you do?

Give your password over the phone since this is an urgent request.

Hang up and call your manager back to make sure to make sure the request is legitimate.

Email your password to your manager to make sure no one overhears it.

Remind your manager of organization password policies and procedures.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following passwords is most secure?

mdcc1927!@#$%

Trojans are the greatest

MdccTrojans!(@&1927

Mdcctrojans

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

I opened an unknown attachment in an email message and strange windows flickered on the screen. What should I do?

Restart the system; that should fix the problem.

Contact the sender of the email and tell them about the problem.

Contact IT about the email and tell them about the problem.

Delete the email and empty the system trash can.

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Why should you use a virtual private network (VPN) when connecting to public Wifi?

So no one can see your screen.

Because it provides 100% security.

To prevent someone from intercepting you connection and stealing data.

Because it makes your connection stronger and faster.

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

How do social engineers successfully manipulate people? Choose all that apply.

By collecting personal information found on public forums like social media.

By following closely behind real employees as they enter the building.

By impersonating members of our organization, such as the IT department.

By planting malicious USB flash drives around our organizations.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?