
MDCC Cyber Security Training Quiz 2

Quiz
•
Computers, Instructional Technology
•
University
•
Hard

Torrey Moore
Used 12+ times
FREE Resource
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
This is a type of attack where the bad guys attempt to trick you into revealing personal information through text messages.
Sniffing
Smishing
Hacking
Texting
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
This term refers to a social engineering technique where an unauthorized individual gains physical entry into a building or room by closely following behind someone who is authorized.
Sneaking
Tailgating
Tag Teaming
Hatch backing
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
You are on vacation and your manager calls, asking for your password to get an urgently needed file. What should you do?
Give your password over the phone since this is an urgent request.
Hang up and call your manager back to make sure to make sure the request is legitimate.
Email your password to your manager to make sure no one overhears it.
Remind your manager of organization password policies and procedures.
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following passwords is most secure?
mdcc1927!@#$%
Trojans are the greatest
MdccTrojans!(@&1927
Mdcctrojans
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
I opened an unknown attachment in an email message and strange windows flickered on the screen. What should I do?
Restart the system; that should fix the problem.
Contact the sender of the email and tell them about the problem.
Contact IT about the email and tell them about the problem.
Delete the email and empty the system trash can.
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Why should you use a virtual private network (VPN) when connecting to public Wifi?
So no one can see your screen.
Because it provides 100% security.
To prevent someone from intercepting you connection and stealing data.
Because it makes your connection stronger and faster.
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
How do social engineers successfully manipulate people? Choose all that apply.
By collecting personal information found on public forums like social media.
By following closely behind real employees as they enter the building.
By impersonating members of our organization, such as the IT department.
By planting malicious USB flash drives around our organizations.
Similar Resources on Wayground
10 questions
EdTech

Quiz
•
University
10 questions
cyber security workshop

Quiz
•
University
12 questions
What I Must Know to Survive NUS

Quiz
•
University
12 questions
ISRC CyberTrivia

Quiz
•
University
7 questions
Quiz about cybersecurity

Quiz
•
University
10 questions
Review (2) Office 365

Quiz
•
University
10 questions
Post Assessment - Cybersecurity Awareness

Quiz
•
9th Grade - Professio...
10 questions
Basic Cyber Awareness Test

Quiz
•
University
Popular Resources on Wayground
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
12 questions
Exponent Expressions

Quiz
•
6th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
20 questions
One Step Equations All Operations

Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade