Cyber Resilience Training

Cyber Resilience Training

Professional Development

16 Qs

quiz-placeholder

Similar activities

Cyber Security Fundamentals

Cyber Security Fundamentals

Professional Development

15 Qs

Part 4.2

Part 4.2

Professional Development

20 Qs

Fraud

Fraud

KG - Professional Development

13 Qs

Cybersecurity Fundamentals

Cybersecurity Fundamentals

Professional Development

21 Qs

Microsoft Outlook Masterclass

Microsoft Outlook Masterclass

Professional Development

20 Qs

IT (data, viruses and more)

IT (data, viruses and more)

8th Grade - Professional Development

20 Qs

Cyber Security Fundamentals

Cyber Security Fundamentals

Professional Development

20 Qs

DST07 Day 1 quiz

DST07 Day 1 quiz

Professional Development

12 Qs

Cyber Resilience Training

Cyber Resilience Training

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Jonathan Thomas

Used 7+ times

FREE Resource

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of social engineering?

Impersonating a trusted individual to obtain sensitive information

Uninstalling antivirus software to expose a computer

Stealing someone's login details from a fraudulent email

Guessing a user's weak password

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Anaya is transferring a confidential document to Charlie using a USB stick. To prevent unauthorised access, she uses a cybersecurity practice that involves converting data into a code. What is this practice known as?

Encryption

Decryption

Firewall

Hacking

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of antivirus software?
Detect and remove malware
Encrypt data
Block internet access
Manage passwords

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Oscar is browsing the internet and notices that some websites have a web address starting with "HTTPS". What does "HTTPS" stand for?

HyperText Transfer Protocol Secure

High Traffic Service

Hypertext Transport Protocol

Hyperlink Transfer System

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Evie received an email and suspects it might be a phishing attempt. Which of the following is NOT a common indicator of a phishing email?

Spelling and grammar errors

Generic salutations

Urgent requests for personal information

An email with no links

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a brute-force attack in the context of cybersecurity?
Repeatedly trying all possible password combinations
A type of phishing attack

Use of physical coercion to retrieve data

A social engineering technique

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which cybersecurity practice involves regularly updating software to fix security vulnerabilities?
Patching
Hacking
Decryption
Password cracking

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?