Control the Outbreak Challenge Questions

Control the Outbreak Challenge Questions

3rd Grade

15 Qs

quiz-placeholder

Similar activities

Creating Passwords

Creating Passwords

3rd - 9th Grade

20 Qs

IDS

IDS

1st - 3rd Grade

10 Qs

Powerful Passwords

Powerful Passwords

1st - 5th Grade

14 Qs

cyber security

cyber security

KG - Professional Development

14 Qs

DFS4143 CHAPTER 2 QUIZ

DFS4143 CHAPTER 2 QUIZ

1st - 3rd Grade

10 Qs

review checkpoint 1 10 general

review checkpoint 1 10 general

1st - 4th Grade

10 Qs

MTA: 98-367 Security Part 2

MTA: 98-367 Security Part 2

KG - Professional Development

20 Qs

Strong Passwords

Strong Passwords

3rd - 9th Grade

20 Qs

Control the Outbreak Challenge Questions

Control the Outbreak Challenge Questions

Assessment

Quiz

Computers

3rd Grade

Hard

Created by

Adrianna Dar

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is your first step when responding to a cyber attack?

Disconnect all devices from the network

Analyze the network traffic

Notify the appropriate authorities

Identify the source of the attack

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of following a risk assessment in a cyber attack?

To determine the severity of the attack

To identify vulnerabilities and potential impacts

To recover lost data

To block the attacker's IP address

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a preventive measure against cyber attacks?

Installing antivirus software

Changing passwords regularly

Performing regular backups

Conducting a post-incident analysis

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you do if you discover a phishing email in an employee's inbox?

Delete the email immediately

Reply to the email to gather more information

Report the email to the IT department

Forward the email to all employees as a warning

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a social engineering attack?

Distributed Denial of Service (DDoS) attack

SQL injection attack

Man-in-the-Middle (MitM) attack

Phishing attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can you secure your wireless network against unauthorized access?

Disable encryption on the network

Use a strong password for the Wi-Fi network

Share the Wi-Fi password with everyone in the office

Use the default network name and password

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you do if an employee loses a company-issued mobile device?

Ignore the incident as it poses no immediate threat

Report the incident to the local authorities

Change all passwords associated with the device

Wait for the employee to find the device before taking action

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?