Control the Outbreak Challenge Questions

Control the Outbreak Challenge Questions

3rd Grade

15 Qs

quiz-placeholder

Similar activities

Cyber Security

Cyber Security

1st - 10th Grade

10 Qs

B Words GCSE Computer Science

B Words GCSE Computer Science

1st - 10th Grade

15 Qs

Google Aptitude Test

Google Aptitude Test

KG - University

10 Qs

BÀI KIỂM TRA GIỮA KÌ 2 LỚP 5

BÀI KIỂM TRA GIỮA KÌ 2 LỚP 5

1st - 10th Grade

10 Qs

FTP

FTP

1st - 10th Grade

12 Qs

BÀI 8. SẮP XẾP VÀ LỌC DỮ LIỆU

BÀI 8. SẮP XẾP VÀ LỌC DỮ LIỆU

1st - 12th Grade

10 Qs

Revision Gr2-2025

Revision Gr2-2025

3rd Grade - University

12 Qs

Control the Outbreak Challenge Questions

Control the Outbreak Challenge Questions

Assessment

Quiz

Computers

3rd Grade

Hard

Created by

Adrianna Dar

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is your first step when responding to a cyber attack?

Disconnect all devices from the network

Analyze the network traffic

Notify the appropriate authorities

Identify the source of the attack

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of following a risk assessment in a cyber attack?

To determine the severity of the attack

To identify vulnerabilities and potential impacts

To recover lost data

To block the attacker's IP address

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a preventive measure against cyber attacks?

Installing antivirus software

Changing passwords regularly

Performing regular backups

Conducting a post-incident analysis

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you do if you discover a phishing email in an employee's inbox?

Delete the email immediately

Reply to the email to gather more information

Report the email to the IT department

Forward the email to all employees as a warning

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a social engineering attack?

Distributed Denial of Service (DDoS) attack

SQL injection attack

Man-in-the-Middle (MitM) attack

Phishing attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can you secure your wireless network against unauthorized access?

Disable encryption on the network

Use a strong password for the Wi-Fi network

Share the Wi-Fi password with everyone in the office

Use the default network name and password

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you do if an employee loses a company-issued mobile device?

Ignore the incident as it poses no immediate threat

Report the incident to the local authorities

Change all passwords associated with the device

Wait for the employee to find the device before taking action

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?