Security Awareness Quiz

Security Awareness Quiz

University

15 Qs

quiz-placeholder

Similar activities

IT01 CHAPTER 6

IT01 CHAPTER 6

University

20 Qs

Communications and Technology

Communications and Technology

University

15 Qs

Business Tools

Business Tools

University

10 Qs

CPA CPF1 System Specifications

CPA CPF1 System Specifications

8th Grade - Professional Development

16 Qs

Checkpoint 2 Review - 12 A

Checkpoint 2 Review - 12 A

12th Grade - University

10 Qs

TECHNOLOGY IN CLASSROOM

TECHNOLOGY IN CLASSROOM

University

10 Qs

Introduction to Mendeley Quiz

Introduction to Mendeley Quiz

University

10 Qs

Technical review - concepts and procedures

Technical review - concepts and procedures

University

18 Qs

Security Awareness Quiz

Security Awareness Quiz

Assessment

Quiz

Instructional Technology

University

Medium

Created by

Arya Nugraha

Used 3+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What does a lock icon symbolize besides a website name?
The website needs a password to be accessed
The website cannot be accessed without the site admin’s permission
The website is a secure website
The website is not accessible at the moment

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Horace is a 64 year-old man who worked as an accountant for SN Associates before his retirement. The company gifted him a laptop at the time of his retirement. Since Horace was not a technically savvy person, he did not install any applications on his laptop, and only used it for checking his email and playing poker online. After some time, Horace’s laptop started giving him problems. It crashed frequently, often displayed the Blue Screen of Death (BSOD), and unwanted windows kept popping up whenever he went online. When Horace took his laptop to the service center, he was told that his laptop was infected with malware. Which software should Horace have installed to prevent malware infection in his laptop?
Adobe Reader
Antivirus software
Skype
One Drive

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Harold, an associate at AQ Corporation, received a phone call from a person claiming to be Bob from the IT department. Bob told Harold that he had noticed that Harold’s computer was running slow, and could help him fix it. Harold, not having much knowledge regarding computers, readily agreed. Following Bob’s instructions, Harold typed in some commands on his computer, and gave remote access to Bob to have his computer fixed. Later on, Harold noticed that confidential information concerning his clients was missing from his computer. Which attack was Harold a victim of?
War driver
Evil twin
Social engineering
Bluesnarfing

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following is the strongest password?
Domike*
Donna1992
donnamike92
Pa#72tLe

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following terms refers to the process of protecting information, and the infrastructure that stores it?
Keystroke logging
Data security
Maintenance
Availability

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Duke is taking some of the best pictures he has yet as an amateur photographer in a pen drive to get his work assessed by an expert. On the subway an unknown person picks his pocket Along with his wallet Duke also lost the pen drive with his pictures. Since he had not made any more copies of those pictures, he lost them forever. What type of data loss is this?
Hardware theft
Malware attack
Natural disaster
Software theft

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following software programs runs on the internet and allows users to find, access, and display web pages?
Email
Web browsers
Extensions
Search engine

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?