Cybersecurity Basics and Best Practices 2

Cybersecurity Basics and Best Practices 2

Professional Development

10 Qs

quiz-placeholder

Similar activities

Office T&T

Office T&T

Professional Development

12 Qs

learning about glady's

learning about glady's

KG - Professional Development

12 Qs

Nuts and Bolts Review

Nuts and Bolts Review

Professional Development

11 Qs

3-D Printing Day-4

3-D Printing Day-4

Professional Development

10 Qs

ASP-SM-Art

ASP-SM-Art

Professional Development

8 Qs

Project Scope Management

Project Scope Management

Professional Development

15 Qs

Intro to the 6S Pyramid

Intro to the 6S Pyramid

Professional Development

10 Qs

Cybersecurity Basics and Best Practices 2

Cybersecurity Basics and Best Practices 2

Assessment

Quiz

Professional Development

Professional Development

Practice Problem

Hard

Created by

Martha Ruelas

Used 8+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of cybersecurity?

Protecting user privacy

Preventing all cyberattacks

Ensuring 100% network uptime

Reducing IT costs

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a common type of malware?

Ransomware

Firewall

Spyware

Trojan Horse

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a strong, recommended practice for creating secure passwords?

Using common phrases

Using only lowercase letters

Using a combination of letters, numbers, and special characters

Using the same password for all accounts

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does "phishing" refer to in the context of cybersecurity?

Fishing for sensitive information in the deep web

An attack that involves malicious software

An attempt to trick individuals into revealing personal information

A type of firewall configuration

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of two-factor authentication (2FA)?

Using a strong password

Fingerprint recognition

Having a secure Wi-Fi network

Using a VPN

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a firewall in cybersecurity?

To protect against physical break-ins

To prevent malware infections

To filter network traffic and block unauthorized access

To encrypt sensitive data

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a common social engineering tactic used by cybercriminals?

Phishing emails

Shoulder surfing

Installing antivirus software

Pretexting

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?