Cyber security refresher

Cyber security refresher

University

10 Qs

quiz-placeholder

Similar activities

Google Classroom Skills Quiz

Google Classroom Skills Quiz

University

12 Qs

Cash Cab Week 4

Cash Cab Week 4

University

8 Qs

Google Classroom

Google Classroom

University

10 Qs

SEP understanding your qualification

SEP understanding your qualification

University

10 Qs

Google Certification - Unit 3 Review

Google Certification - Unit 3 Review

9th Grade - University

12 Qs

Quiz

Quiz

University

12 Qs

OFM_Ch_5_Mail and Mailing Procedure

OFM_Ch_5_Mail and Mailing Procedure

University

10 Qs

Cyber security refresher

Cyber security refresher

Assessment

Quiz

Professional Development

University

Hard

Created by

n q

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following attacks requires a carrier file to self-replicate?

Trojan

Virus

Worm

Spam

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Someone who is posing as an IT tech requests information about your computer configuration.  What kind of attack is this?

Insider threat

Phishing

Social engineering

Whaling

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following describes monitoring software installed without your consent?

Malware

Adware

Spyware

Ransomware

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

You have received an email purportedly from Shopee regarding a discount offer for a product with a link provided. What should you do about it?

Click on the link immediately so that you do not miss out on the opportunity

Verify the display name of the sender and proceed to click on the link if it looks genuine

Verify the email id of the sender and proceed to click on the link if it looks genuine

Go directly to Shopee website and look for the offer there

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

You’ve inadvertently opened a web link contained in a suspicious email and now your computer is behaving strangely. What should course of action should you follow next?

The purpose of a firewall and security software is to block malicious code getting into your computer in the first place so no action is needed.

You need to update and run your anti-virus software.

You need to contact ICT Service Deck.

Keep an eye on the performance of your computer.

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the best way to validate a legitimate email vs. a phishing email?

Bad spelling, poor syntax and grammar are one of the tell-tale signs of a fake email.

Look at the email headers to see where it really came from.

Look for poorly replicated logos.

Contact the sender on some other medium besides email to verify whether they sent you the email.

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Unexpectedly, you get an email from a colleague who requests you to urgently click on an email link which they’ve sent you. What is the safest option?

The link is from a known person therefore it’s safe to open.

If the link was malicious the organisation’s firewall would have flagged or blocked it, therefore it’s safe to open.

Reply to the sender to double-check if the link is safe to open as they might have sent it accidentally.

Do not click the link. Phone the sender for verification.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?