Cyber Security Awareness Month

Cyber Security Awareness Month

Professional Development

5 Qs

quiz-placeholder

Similar activities

Cyber Safety And Ethics

Cyber Safety And Ethics

KG - Professional Development

8 Qs

IT Training

IT Training

Professional Development

10 Qs

Care Month Quiz

Care Month Quiz

Professional Development

10 Qs

Discord quiz 2021

Discord quiz 2021

3rd Grade - Professional Development

10 Qs

Google

Google

2nd Grade - Professional Development

10 Qs

Platinum Pro

Platinum Pro

Professional Development

10 Qs

Vimal-OB

Vimal-OB

Professional Development

10 Qs

Grammarville Chapter 3: The Uprising

Grammarville Chapter 3: The Uprising

Professional Development

10 Qs

Cyber Security Awareness Month

Cyber Security Awareness Month

Assessment

Quiz

Other

Professional Development

Hard

Created by

Maame Aidoo

Used 4+ times

FREE Resource

5 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

I am not to be shared.When I am with you, I am solely yours. I get heartbroken when I am shared and I can go a long way to hurt you if you do, what am I?

2.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which of these actions can contribute to ensuring the security of your passwords?

Setting a password that is a combination of uppercase, lower case, special characters and numbers.

Changing your password regularly.

Not using personally identifiable information such as name, birthdates, and telephone numbers.

Using the same password for all accounts.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

When entering personal data such as credit card information into a website, it is important to verify the url starts with 'https" to ensure the transaction is protected by SSL encryption.

True

False

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is an example of a “phishing” attack?

Sending someone an email that contains a malicious link that is disguised to look like an email from someone the person knows.

Creating a fake website that looks nearly identical to a real website in order to trick users into entering their login information.

Sending someone a text message that contains a malicious link that is disguised to look like a notification that the person has won a contest.

All of the above

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Criminals access someone’s computer and encrypt the user’s personal files and data. The user is unable to access this data unless they pay the criminals to decrypt the files. This is known as ...

Botnet

Ransomware

Spam

None of the above