Craft Silicon IT Security Awareness Test

Craft Silicon IT Security Awareness Test

Professional Development

18 Qs

quiz-placeholder

Similar activities

R033: 02 Life stages and Milestones

R033: 02 Life stages and Milestones

Professional Development

13 Qs

Among Us

Among Us

1st Grade - Professional Development

13 Qs

Harry Potter

Harry Potter

KG - Professional Development

15 Qs

Basics _ 8051MC

Basics _ 8051MC

Professional Development

15 Qs

Mgt Quiz

Mgt Quiz

Professional Development

15 Qs

1.5 GSC reviewer

1.5 GSC reviewer

Professional Development

15 Qs

World Water Day 2024

World Water Day 2024

Professional Development

15 Qs

Craft Silicon IT Security Awareness Test

Craft Silicon IT Security Awareness Test

Assessment

Quiz

Other

Professional Development

Easy

Created by

Ernest Elnino

Used 8+ times

FREE Resource

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What is phishing, and how does it differ from other cyber threats?

A computer virus

Social media manipulation

Deceptive attempts to trick individuals into revealing sensitive information

2.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What are some common tactics used by phishers to manipulate individuals?

Urgency and fear

Positive reinforcement

Entertainment and humour

3.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What are some safe email habits that individuals can adopt to avoid falling victim to phishing?

Click on links from known senders

Download attachments from unfamiliar emails

Verify email sender addresses and avoid clicking on suspicious links

4.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

How can you identify a phishing URL, and why is it crucial to verify website addresses?

Ignore website addresses

Click on any link and assess the website later

Verify URLs by checking for spelling mistakes and using HTTPS

5.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Attackers often use email attachments as a method for phishing. What is the risk associated with opening attachments from unknown or suspicious emails?

No risk, as email attachments are always safe to open

Risk of spreading positive content

Risk of downloading malware or viruses onto your device

6.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

You receive an email from the group CEO, which email would you respond to?

kamal@craftsi1icon.com

kamal@craftsilicon.com

kama1@craftsiIicon.com

kamaI@craftsiIicon.com

7.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Define social engineering and provide examples of how it can be used in cyber attacks.

A type of computer programming that helps protect from cyber attacks

Manipulating individuals to gain confidential information

A form of networking and socialisation

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?