Cyber Security

Cyber Security

KG - University

12 Qs

quiz-placeholder

Similar activities

Online Safety

Online Safety

8th Grade

12 Qs

Cyber Security

Cyber Security

Professional Development

15 Qs

Cyber Hygiene

Cyber Hygiene

University

15 Qs

Cyber Security Refresher

Cyber Security Refresher

KG - University

12 Qs

Cyber Security Scavenger Hunt Quiz

Cyber Security Scavenger Hunt Quiz

1st - 5th Grade

10 Qs

Cyber Security Quiz

Cyber Security Quiz

Professional Development

10 Qs

Preventive cybersecurity

Preventive cybersecurity

1st - 5th Grade

15 Qs

Cyber Security 101

Cyber Security 101

University

10 Qs

Cyber Security

Cyber Security

Assessment

Quiz

Other

KG - University

Medium

Created by

Test Test

Used 8+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Smishing is a type of attack done over?

Email

SMS

Wi-Fi

Pen drive

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following details can be shared over phone whenever you receive calls stating from banks or any other support team?

Account number

CVV number

Card expiry details

None of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your business email account has been compromised and leaked in a data breach. What is the best course of action(s)?

Change your password immediately

Inform the security team of your organization

Change the Password on all sites where you use the same password

All of above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If you receive a suspicious email, should you?

Reply to it

Open the attachments

Click the links

Report it to the phishing reporting mailbox of your government

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which month is considered or recognized as Cyber Security Month?

September

October

November

December

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which URL(s) bring(s) you to Google’s Home Page?

https://google.com

https://gogle.com

https://gooogle.com

All of above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following attacks requires a carrier file to self-replicate?

Trojan

Virus

Worm

Spam

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?