
Cybersecurity threats and best practices
Authored by Camila Carrasco
English
University
Used 21+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
1. Which one of these statements is correct?
If you get an email that looks like it’s from someone you know, you can click on any links as long as you have a spam blocker and anti-virus protection.
You can trust an email really comes from a client if it uses the client’s logo and contains at least one fact about the client that you know to be true.
If you get a message from a colleague who needs your network password, you should never give it out unless the colleague says it’s an emergency.
If you get an email from Human Resources asking you to provide personal information right away, you should check it out first to make sure they are who they say are.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An email from your boss asks for the name, addresses, and credit card information of the company’s top clients. The email says it’s urgent and to please reply right away. You should reply right away. True or False?
True
False
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
ou get a text message from a vendor who asks you to click on a link to renew your password so that you can log in to its website. You should:
Reply to the text to confirm that you really need to renew your password.
Pick up the phone and call the vendor, using a phone number you know to be correct, to confirm that the request is real.
Click on the link. If it takes you to the vendor’s website, then you’ll know it’s not a scam.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Email authentication can help protect against phishing attacks. True or False?
True
False
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
If you fall for a phishing scam, what should you do to limit the damage?
A. Delete the phishing email.
Delete the phishing email.
Unplug the computer. This will get rid of any malware.
Change any compromised passwords.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Promoting physical security includes protecting:
Only paper files.
Only paper files and any computer on which you store electronic copies of those files.
Only paper files, flash drives, and point-of-sale devices.
All the above plus any other device with sensitive information on it.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Paper files that have sensitive information should be disposed of in a locked trash bin. True or False?
True
False
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
noun, verb and adjective
Quiz
•
University
10 questions
Budgeting - Toeic
Quiz
•
University
10 questions
ZERO CONDITIONAL (with "if") 2 level.
Quiz
•
10th Grade - University
10 questions
The Da Vinci Code
Quiz
•
University
15 questions
Ms Hoa- ESP- Tourism-Unit 1-2-3-4
Quiz
•
University
11 questions
Translation methods
Quiz
•
University
10 questions
Unit 11: Fact or Fake
Quiz
•
University
10 questions
NFT Quizziz
Quiz
•
University
Popular Resources on Wayground
8 questions
Spartan Way - Classroom Responsible
Quiz
•
9th - 12th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
14 questions
Boundaries & Healthy Relationships
Lesson
•
6th - 8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
3 questions
Integrity and Your Health
Lesson
•
6th - 8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
9 questions
FOREST Perception
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade