Cyber security

Cyber security

Professional Development

5 Qs

quiz-placeholder

Similar activities

Procesos Productivos  M-S Conocimiento II

Procesos Productivos M-S Conocimiento II

Professional Development

10 Qs

Quiz 11

Quiz 11

Professional Development

10 Qs

Quiz Refreshment Risk Management Session 1

Quiz Refreshment Risk Management Session 1

Professional Development

10 Qs

Packaging & Materials Handling

Packaging & Materials Handling

University - Professional Development

8 Qs

i-LEAD 2

i-LEAD 2

Professional Development

10 Qs

CONOCIMIENTOS TEMPORADA A22

CONOCIMIENTOS TEMPORADA A22

Professional Development

9 Qs

QUIZZ RRHH 152

QUIZZ RRHH 152

Professional Development

10 Qs

COVID-19

COVID-19

Professional Development

10 Qs

Cyber security

Cyber security

Assessment

Quiz

Professional Development

Professional Development

Medium

Created by

Alyazia Alyazia

Used 4+ times

FREE Resource

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Some websites and online services use a security process called two-step authentication. Which of the following images is an example of two-step authentication?

Media Image
Media Image
Media Image

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following four passwords is the most secure?

Boat123

into*48

WTh!5Z

P@ssword!

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If a public Wi-Fi network (such as in an airport or café) requires a password to access, is it generally safe to use that network for sensitive activities such as online banking?

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Criminals access someone’s computer and encrypt the user’s personal files and data. The user is unable to access this data unless they pay the criminals to decrypt the files. This practice is called …

Botnet

Spam

Ransomware

Driving

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is an example of a “phishing” attack?

Sending someone an email that contains a malicious link that is disguised to look like an email from someone the person knows

Creating a fake website that looks nearly identical to a real website in order to trick users into entering their login information

Sending someone a text message that contains a malicious link that is disguised to look like a notification that the person has won a contest

All of the above

Discover more resources for Professional Development