Cybersecurity Fundamentals

Cybersecurity Fundamentals

Professional Development

20 Qs

quiz-placeholder

Similar activities

COVID-19

COVID-19

Professional Development

16 Qs

Diseminasi Bahasa Daerah

Diseminasi Bahasa Daerah

Professional Development

20 Qs

Organizing Data

Organizing Data

Professional Development

15 Qs

National Education Day Quiz

National Education Day Quiz

6th Grade - Professional Development

20 Qs

17 Days of SDGs Quiz - Day 16 (English)

17 Days of SDGs Quiz - Day 16 (English)

3rd Grade - Professional Development

15 Qs

LEARNING & TEACHING

LEARNING & TEACHING

University - Professional Development

20 Qs

Common Mistakes - Part G

Common Mistakes - Part G

4th Grade - Professional Development

20 Qs

OBE Quiz

OBE Quiz

Professional Development

21 Qs

Cybersecurity Fundamentals

Cybersecurity Fundamentals

Assessment

Quiz

Education

Professional Development

Practice Problem

Hard

Created by

TDX Facilitator

Used 8+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The presence of a weakness in a system, program, or network is referred to as a:

vulnerability

exploit

adware

malware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following statements is true about the trojans?

Trojans spread throughout the network without user intervention

Trojans conceal themselves by convincing users that it is a legitimate file.

Trojans encrypt user files and documents and demand payment to decrypt them.

Trojans display ads on web browser screens.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is NOT an example of a Social Engineering threat:

Spear Phishing

Vishing

Whaling

Denial of Service (DoS)

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the typical attributes of a spear phishing attack? (Choose two)

Focused & personalized

Uses email spoofing techniques

Large number of recipients (Mass spam)

Smaller number of recipients

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Phishing technique relies of phone audio interactions to conduct further social engineering?

Vishing

Smishing

Whaling

Spear Phishing

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are some ways to identify potential phishing emails: (Select all that apply)

Spelling & grammar mistakes

Suspicious links or attachments

Threatening language with demands

Unexpected request for personal information

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of cyber attack attempts to intercept data between sender(s) & recipients(s)?

Denial of Service

Man in the Middle

Ransomware

Brute Force

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?