
Cyber Security
Authored by Saatvik Yadav
Other
Professional Development
Used 6+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
1 min • 5 pts
Define Cybersecurity
Cybersecurity refers to the protection of internet-connected systems such as software, hardware, electronic data, etc., from cyber attacks. In computing text, it is referred to as protection against unauthorized access.
the practice of protecting systems, networks, and programs from digital attacks.
Someone with the potential to cause harm by damaging or destroying the official data of a system or organization.
It refers to weaknesses in a system that makes threat outcomes more possible and even more dangerous.
It refers to a combination of threat probability and impact/loss. In simple terms, it is related to potential damage or loss when a threat exploits the vulnerability.
2.
FILL IN THE BLANK QUESTION
30 sec • 5 pts
I am not to be shared.When I am with you, I am solely yours. I get heartbroken when I am shared and I can go a long way to hurt you if you do, what am I?
(a)
3.
MULTIPLE SELECT QUESTION
30 sec • 5 pts
A strong password is a critical line of defense in preventing a cyberattack. Which are the criteria of new password policy:
Contains at least 14 characters
Reuse old passwords or add on to existing passwords
Contains at least 3 of the 4: Uppercase, Lowercase, Number, Symbol
Does not contain the words ‘PETRONAS’ in any form
4.
MULTIPLE SELECT QUESTION
30 sec • 5 pts
Which of these actions can contribute to ensuring the security of your passwords?
Setting a password that is a combination of uppercase, lower case, special characters and numbers.
Changing your password regularly.
Not using personally identifiable information such as name, birthdates, and telephone numbers.
Using the same password for all accounts.
5.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Criminals access someone’s computer and encrypt the user’s personal files and data. The user is unable to access this data unless they pay the criminals to decrypt the files. This is known as ...
Botnet
Ransomware
Spam
None of the above
6.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
_______________ is a tools which protects company data on mobile devices without infringing into personal data.
Mobile Data Management
Mobile Data Administration
Mobile Device Administration
Mobile Device Management
7.
MULTIPLE CHOICE QUESTION
2 mins • 5 pts
Is this a legitimate email?
True
False
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?