Cyber Security

Cyber Security

KG - University

12 Qs

quiz-placeholder

Similar activities

Bully Quiz

Bully Quiz

3rd Grade

10 Qs

Literasi Digital kelas 6 essay smt 1

Literasi Digital kelas 6 essay smt 1

6th Grade

10 Qs

Password Power-Up

Password Power-Up

3rd Grade

10 Qs

Online safety

Online safety

12th Grade

16 Qs

Cyber Bullying

Cyber Bullying

6th - 8th Grade

16 Qs

Malaysia Cyber Security Strategy (MCSS)

Malaysia Cyber Security Strategy (MCSS)

Professional Development

10 Qs

WSS Cybersecurity Quiz

WSS Cybersecurity Quiz

7th - 10th Grade

15 Qs

CYBER LAW

CYBER LAW

University

16 Qs

Cyber Security

Cyber Security

Assessment

Quiz

Other

KG - University

Medium

Created by

Test Test

Used 8+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Smishing is a type of attack done over?

Email

SMS

Wi-Fi

Pen drive

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following details can be shared over phone whenever you receive calls stating from banks or any other support team?

Account number

CVV number

Card expiry details

None of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your business email account has been compromised and leaked in a data breach. What is the best course of action(s)?

Change your password immediately

Inform the security team of your organization

Change the Password on all sites where you use the same password

All of above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If you receive a suspicious email, should you?

Reply to it

Open the attachments

Click the links

Report it to the phishing reporting mailbox of your government

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which month is considered or recognized as Cyber Security Month?

September

October

November

December

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which URL(s) bring(s) you to Google’s Home Page?

https://google.com

https://gogle.com

https://gooogle.com

All of above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following attacks requires a carrier file to self-replicate?

Trojan

Virus

Worm

Spam

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?