Cyber Security Awareness Training - Quiz

Cyber Security Awareness Training - Quiz

10 Qs

quiz-placeholder

Similar activities

Speech Contexts Types

Speech Contexts Types

11th Grade

15 Qs

Business Letter

Business Letter

5th Grade

9 Qs

Correspondence

Correspondence

University

10 Qs

EMAILS

EMAILS

University

15 Qs

Ethos, Pathos, Logos Exam

Ethos, Pathos, Logos Exam

7th - 9th Grade

15 Qs

Application Letter

Application Letter

10th - 12th Grade

10 Qs

writing and email

writing and email

11th Grade

10 Qs

M2 OC

M2 OC

1st Grade

10 Qs

Cyber Security Awareness Training - Quiz

Cyber Security Awareness Training - Quiz

Assessment

Quiz

English

Easy

CCSS
RI.1.5, RI.2.5, RI.3.5

+2

Standards-aligned

Created by

abc tan

Used 3+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Who in your organization is responsible for making sure that you and your organization stay safe from cyberattacks?

Information Technology (IT)

Our technology vendors

Everyone

The cybersecurity team

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You receive a message that is clearly a scam; what should you do? Select the best answer.

Don't take any action the message asks and delete it

Report the message right away, so others don't fall for it.

Save the message and see if others report it just to be sure.

All of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you do if you receive a suspicious email?

Share it with coworkers

Unplug your computer

When in doubt, don't click

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do the attackers do to create a sophisticated and convincing message?

Select the correct answer out of the following options:

Use fake profiles to meet new people

Imitate your business contacts or friends

Send random official newsletters

Tags

CCSS.RI.1.5

CCSS.RI.2.5

CCSS.RI.3.5

CCSS.RI.5.5

CCSS.RI.6.5

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You receive an email with attachments from someone you know; however, the attachments are unusual. What should you do?

Since it's someone you know, it is safe to open the attachments.

Check with the sender by phone, to see if the email is legitimate.

Reply to the email requesting further information.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the best practice to avoid falling victim to phishing attack?

Download the files you received to check if they are real.

Verify the email is legitimate, and when in doubt, don't click.

Keep your browser and computer software up to date.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you double check in order to identify a phishing attack?

Sender's email address, language used and context of the message.

Sender's email address, absence of attachments and context of the message.

Sender's email address, images in the body of the email, and logo design under the signature

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?