Search Header Logo

Craft Silicon IT Security Awareness Test

Authored by Ernest Elnino

Other

Professional Development

Used 8+ times

Craft Silicon IT Security Awareness Test
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What is phishing, and how does it differ from other cyber threats?

A computer virus

Social media manipulation

Deceptive attempts to trick individuals into revealing sensitive information

2.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What are some common tactics used by phishers to manipulate individuals?

Urgency and fear

Positive reinforcement

Entertainment and humour

3.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What are some safe email habits that individuals can adopt to avoid falling victim to phishing?

Click on links from known senders

Download attachments from unfamiliar emails

Verify email sender addresses and avoid clicking on suspicious links

4.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

How can you identify a phishing URL, and why is it crucial to verify website addresses?

Ignore website addresses

Click on any link and assess the website later

Verify URLs by checking for spelling mistakes and using HTTPS

5.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Attackers often use email attachments as a method for phishing. What is the risk associated with opening attachments from unknown or suspicious emails?

No risk, as email attachments are always safe to open

Risk of spreading positive content

Risk of downloading malware or viruses onto your device

6.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

You receive an email from the group CEO, which email would you respond to?

kamal@craftsi1icon.com

kamal@craftsilicon.com

kama1@craftsiIicon.com

kamaI@craftsiIicon.com

7.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Define social engineering and provide examples of how it can be used in cyber attacks.

A type of computer programming that helps protect from cyber attacks

Manipulating individuals to gain confidential information

A form of networking and socialisation

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?