Security Awareness

Security Awareness

Professional Development

5 Qs

quiz-placeholder

Similar activities

IT General Control

IT General Control

Professional Development

10 Qs

Initial Assessment - Cybersecurity Awareness

Initial Assessment - Cybersecurity Awareness

9th Grade - Professional Development

10 Qs

What Makes A Good Password?

What Makes A Good Password?

Professional Development

4 Qs

Cyber Security

Cyber Security

Professional Development

10 Qs

Monday Briefing Cybersecurity

Monday Briefing Cybersecurity

Professional Development

10 Qs

Computer Security Assessment

Computer Security Assessment

Professional Development

10 Qs

Cyber Security Awareness - TC Pacific IT Service Desk

Cyber Security Awareness - TC Pacific IT Service Desk

Professional Development

10 Qs

Cybersecurity Quiz

Cybersecurity Quiz

Professional Development

9 Qs

Security Awareness

Security Awareness

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Sabrina Young

Used 1+ times

FREE Resource

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

CyberSecurity is everybody's

business

responsibility

job

favourite thing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Option Below is NOT a sign of a phishing email?

Generic Greeting or Signature

Inconsistent email addresses, links and domain names

An attachment you were expecting

Threats or a sense of urgency

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Tip Will Not Help Prevent Malware?

Use antivirus/antimalware software

Click on hyperlinks

Only download reputable apps/software

Only visit reputable websites

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Option Below is NOT a Password Best Practice

Use a long passphrase that's easy for you to remember but hard for others to guess

Use new, unique passwords for every account

Keep passwords secret (e.g. use a password manager)

Change compromised passwords when you get a chance

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What team should you contact if you see something suspicious (e.g. unusual email request, password sharing, leakage of business information, etc.)