Search Header Logo

DMA IT CYBERSECURITY DAY

Authored by El Youness

Instructional Technology

1st - 3rd Grade

Used 5+ times

DMA IT CYBERSECURITY DAY
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following is an example of a “phishing” attack?

Sending someone an email that contains a malicious link that is disguised to look like an email from someone the person knows

Creating a fake website that looks nearly identical to a real website in order to trick users into entering their login information

Sending someone a text message that contains a malicious link that is disguised to look like a notification that the person has won a contest

All of the options

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following four passwords is the most secure?

Boat123

WTh!5Z

into*48

123456

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Criminals access someone’s computer and encrypt the user’s personal files and data. The user is unable to access this data unless they pay the criminals to decrypt the files. This practice is called …

Botnet

Ransomware

Driving

Spam

None of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

If a public Wi-Fi network (such as in an airport or café) requires a password to access, is it generally safe to use that network for sensitive activities such as online banking (Finance) & system approvals?

Yes, It is safe

No, it is not safe

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What kind of cybersecurity risks can be minimized by using a Virtual Private Network (VPN)?

Use of insecure Wi-Fi networks

Key-logging

De-anonymization by network operators

Phishing attacks

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Cyber security protection of an organization is the responsibility of:

Everyone in the organization.

The CIO or CISO executive / IT Department

A specialized cyber security defense team

The board of directors

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Social engineering uses which aspects of human nature?

Trust manipulation

Desire to be helpful

Lack of understanding

All of the options

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?