
Security Awareness Quiz
Authored by Arya Nugraha
Instructional Technology
University
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
What does a lock icon symbolize besides a website name?
The website needs a password to be accessed
The website cannot be accessed without the site admin’s permission
The website is a secure website
The website is not accessible at the moment
2.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Horace is a 64 year-old man who worked as an accountant for SN Associates before his retirement. The company gifted him a laptop at the time of his retirement. Since Horace was not a technically savvy person, he did not install any applications on his laptop, and only used it for checking his email and playing poker online. After some time, Horace’s laptop started giving him problems. It crashed frequently, often displayed the Blue Screen of Death (BSOD), and unwanted windows kept popping up whenever he went online. When Horace took his laptop to the service center, he was told that his laptop was infected with malware. Which software should Horace have installed to prevent malware infection in his laptop?
Adobe Reader
Antivirus software
Skype
One Drive
3.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Harold, an associate at AQ Corporation, received a phone call from a person claiming to be Bob from the IT department. Bob told Harold that he had noticed that Harold’s computer was running slow, and could help him fix it. Harold, not having much knowledge regarding computers, readily agreed. Following Bob’s instructions, Harold typed in some commands on his computer, and gave remote access to Bob to have his computer fixed. Later on, Harold noticed that confidential information concerning his clients was missing from his computer. Which attack was Harold a victim of?
War driver
Evil twin
Social engineering
Bluesnarfing
4.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Which of the following is the strongest password?
Domike*
Donna1992
donnamike92
Pa#72tLe
5.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Which of the following terms refers to the process of protecting information, and the infrastructure that stores it?
Keystroke logging
Data security
Maintenance
Availability
6.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Duke is taking some of the best pictures he has yet as an amateur photographer in a pen drive to get his work assessed by an expert. On the subway an unknown person picks his pocket Along with his wallet Duke also lost the pen drive with his pictures. Since he had not made any more copies of those pictures, he lost them forever. What type of data loss is this?
Hardware theft
Malware attack
Natural disaster
Software theft
7.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Which of the following software programs runs on the internet and allows users to find, access, and display web pages?
Email
Web browsers
Extensions
Search engine
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?