Search Header Logo

Control the Outbreak Challenge Questions

Authored by Adrianna Dar

Computers

3rd Grade

Used 1+ times

Control the Outbreak Challenge Questions
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is your first step when responding to a cyber attack?

Disconnect all devices from the network

Analyze the network traffic

Notify the appropriate authorities

Identify the source of the attack

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of following a risk assessment in a cyber attack?

To determine the severity of the attack

To identify vulnerabilities and potential impacts

To recover lost data

To block the attacker's IP address

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a preventive measure against cyber attacks?

Installing antivirus software

Changing passwords regularly

Performing regular backups

Conducting a post-incident analysis

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you do if you discover a phishing email in an employee's inbox?

Delete the email immediately

Reply to the email to gather more information

Report the email to the IT department

Forward the email to all employees as a warning

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a social engineering attack?

Distributed Denial of Service (DDoS) attack

SQL injection attack

Man-in-the-Middle (MitM) attack

Phishing attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can you secure your wireless network against unauthorized access?

Disable encryption on the network

Use a strong password for the Wi-Fi network

Share the Wi-Fi password with everyone in the office

Use the default network name and password

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you do if an employee loses a company-issued mobile device?

Ignore the incident as it poses no immediate threat

Report the incident to the local authorities

Change all passwords associated with the device

Wait for the employee to find the device before taking action

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?