
Cyber Safe Session 1
Authored by Crystal Eleanor
Instructional Technology
Professional Development
Used 14+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What is Cybersecurity?
A virtual computer world.
A practice of protecting hardware and software from cyber-attacks.
Knowledge related to information communication technologies.
The states of being free from danger or threat.
2.
MULTIPLE SELECT QUESTION
20 sec • 1 pt
Secure information has three properties, often referred to as the CIA triad. What are the CIA triad components. You may choose three best answers.
Availability
Confidentiality
Information
Integrity
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which is the best definition of a hacker?
A person who works in commerce.
A student who studies cybersecurity.
A person who exploits the weakness in computer systems to gain access.
A person who utilizes a computer or network service in office.
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Insider Threats are classified into two types. One of them is categorised as a Malicious Insider. What exactly is a malicious insider?
Their goal is to steal data intentionally and purposefully.
They are simply ordinary employees who have made a mistake.
They have sent an email containing sensitive personal information to the wrong person.
They have forgotten to shred records before throwing them out.
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What is Phishing Attack?
The process of catching wild fish from the river.
An act where a person sends an email to a CEO of an organization.
An act of writing an email to a co-worker about a new task update.
A malicious act of scamming users for their private information.
6.
MULTIPLE SELECT QUESTION
30 sec • 3 pts
What are the common indicators of Clone Phishing? You may choose three best answers.
Cyber actors pretend to be customer support personnel on social media platforms.
The email may contains malicious links or attachments.
The email takes the form of a re-sent email and is slightly tweaked.
The email is sent from a spoofed address.
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Best practices for email phishing EXCEPT,
Hover over the email’s link before clicking.
Never respond to requests for private info.
Beware of messages that sound urgent or too good to be true.
Use work email for personal use.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Resistencias
Quiz
•
Professional Development
10 questions
Introducción Google Docs
Quiz
•
KG - Professional Dev...
10 questions
FOTOGRAFÍA DIGITAL SEMANA 3
Quiz
•
Professional Development
15 questions
KUIS KE 2 SEMINAR NASIONAL KEFARMASIAN (HMPF-USB)
Quiz
•
Professional Development
10 questions
Principles of Electronic Communication ; A review
Quiz
•
Professional Development
15 questions
PLATAFORMAS TECNOLÓGICAS EDUCATIVAS
Quiz
•
Professional Development
10 questions
DL Refresher
Quiz
•
KG - Professional Dev...
10 questions
Comunicación Asertiva
Quiz
•
Professional Development
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade