My Quiz

My Quiz

Professional Development

11 Qs

quiz-placeholder

Similar activities

Monday Briefing Cybersecurity

Monday Briefing Cybersecurity

Professional Development

10 Qs

Shopper/Refunds/Complete New Booking

Shopper/Refunds/Complete New Booking

Professional Development

10 Qs

Initial Assessment - Cybersecurity Awareness

Initial Assessment - Cybersecurity Awareness

9th Grade - Professional Development

10 Qs

Power BI Service 01 - Introduction

Power BI Service 01 - Introduction

Professional Development

10 Qs

Cloud Computing

Cloud Computing

KG - Professional Development

11 Qs

Cyber Security

Cyber Security

Professional Development

10 Qs

CPT 209 Chapter 1 Did You Know

CPT 209 Chapter 1 Did You Know

University - Professional Development

14 Qs

All About The Internet

All About The Internet

5th Grade - Professional Development

15 Qs

My Quiz

My Quiz

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Hasit Mankad

Used 1+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Who is responsible for Cyber Security?

Technology Information Security Office

Developers

Government

Everyone

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

When receiving an email from an unknown contact that has a link, you should?

Open the link to view its contents

Report the suspicious email to TISO

Forward the email to your co-workers to allow them to open the link first

Forward the email to your personal email account so you can open it at home

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What does social engineering mean in a security context?

Building secure systems that are easy to use for society

It is a form of social deception focused on information gathering, fraud, or system access.

It is a Honeypot


All of the above

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The other day you were watching the news and you heard a journalist talking about a of cyber-threat. Essentially criminals seem to be able to use malicious software to restrict users from accessing their computer system or personal files. Later criminals demand a payment in order for the restriction to be removed. What is the name of this threat?


Ransomware

Botnet


Virus

Trojan

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What facet of cloud computing helps to guard against downtime and determines costs?

Service-level agreements

Bandwidth fees

Application programming interfaces

Virtual private networks

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Virtual Machine Ware (VMware) is an example of

Infrastructure Service

Software Service

Platform Service

Security Service

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which is considered the most widely used cloudcomputing service?

Infrastructure-as-a-Service (IaaS)

Platform-as-a-Service (PaaS)

Communication-as-a-Service (CaaS)

Software-as-a-Service (SaaS)

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?