Cyber Safe Session 1

Cyber Safe Session 1

Professional Development

10 Qs

quiz-placeholder

Similar activities

ICT Matters

ICT Matters

4th Grade - Professional Development

10 Qs

Seminario Web

Seminario Web

Professional Development

10 Qs

ADMS

ADMS

University - Professional Development

10 Qs

Who run the test ?

Who run the test ?

Professional Development

10 Qs

informática I 3er parcial 1º I

informática I 3er parcial 1º I

10th Grade - Professional Development

11 Qs

D2NHS

D2NHS

Professional Development

10 Qs

PRE Eval WEG Compras SAP

PRE Eval WEG Compras SAP

Professional Development

12 Qs

Administracion de Proyectos de T.I. primer parcial

Administracion de Proyectos de T.I. primer parcial

University - Professional Development

10 Qs

Cyber Safe Session 1

Cyber Safe Session 1

Assessment

Quiz

Instructional Technology

Professional Development

Medium

Created by

Crystal Eleanor

Used 14+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

What is Cybersecurity?

A virtual computer world.

A practice of protecting hardware and software from cyber-attacks.

Knowledge related to information communication technologies.

The states of being free from danger or threat.

2.

MULTIPLE SELECT QUESTION

20 sec • 1 pt

Secure information has three properties, often referred to as the CIA triad. What are the CIA triad components. You may choose three best answers.

Availability

Confidentiality

Information

Integrity

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which is the best definition of a hacker?

A person who works in commerce.

A student who studies cybersecurity.

A person who exploits the weakness in computer systems to gain access.

A person who utilizes a computer or network service in office.

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Insider Threats are classified into two types. One of them is categorised as a Malicious Insider. What exactly is a malicious insider?

Their goal is to steal data intentionally and purposefully.

They are simply ordinary employees who have made a mistake.

They have sent an email containing sensitive personal information to the wrong person.

They have forgotten to shred records before throwing them out.

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is Phishing Attack?

The process of catching wild fish from the river.

An act where a person sends an email to a CEO of an organization.

An act of writing an email to a co-worker about a new task update.

A malicious act of scamming users for their private information.

6.

MULTIPLE SELECT QUESTION

30 sec • 3 pts

What are the common indicators of Clone Phishing? You may choose three best answers.

Cyber actors pretend to be customer support personnel on social media platforms.

The email may contains malicious links or attachments.

The email takes the form of a re-sent email and is slightly tweaked.

The email is sent from a spoofed address.

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Best practices for email phishing EXCEPT,

Hover over the email’s link before clicking.

Never respond to requests for private info.

Beware of messages that sound urgent or too good to be true.

Use work email for personal use.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?