Search Header Logo

Cyber Security - Learning Tales

Other

Professional Development

Used 6+ times

Cyber Security - Learning Tales
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

How does malware get onto your computer?

Email attachments or links


On USB sticks

By visiting insecure websites

All the options

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following is an example of a “phishing” attack?

Sending someone an email that contains a malicious link that is disguised to look like an email from someone the person knows.

Creating a fake website that looks nearly identical to a real website in order to trick users into entering their login information.

Sending someone a text message that contains a malicious link that is disguised to look like a notification that the person has won a contest.

All of the above.

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

To protect the computer system against the hacker and different kind of viruses, one must always keep _________ on in the computer system.

Antivirus

Firewall

Vlc player

Script

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is considered as the unsolicited commercial email?

Virus

Malware

Spam

All of the above

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

As a security manager, how would you explain the primary goal of a security awareness program to senior management? (Information Security & Risk Management Domain)

Provide a vehicle for communicating security procedures

Provide a clear understanding of potential risk and exposure

Provide a forum for disclosing exposure and risk analysis

Provide a forum to communicate user responsibilities

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

________________ is the process of recovering passwords from data that have been stored in or transmitted by a computer system ?

Network cracking

Password cracking

System cracking

Phishing

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of this is an example of physical hacking?

Remote Unauthorised access

Inserting malware loaded USB to a system

SQL Injection on SQL vulnerable site

DDoS (Distributed Denial of Service) attack

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?