Cyber Security Training Part 2 & 3

Cyber Security Training Part 2 & 3

Professional Development

10 Qs

quiz-placeholder

Similar activities

Sec+ Quiz - 2

Sec+ Quiz - 2

Professional Development

15 Qs

Sec+ CH.2 Review Test

Sec+ CH.2 Review Test

Professional Development

15 Qs

IT ENGLISH: Research Project Topics - Digital ID

IT ENGLISH: Research Project Topics - Digital ID

Professional Development

10 Qs

CAMBRIDGE - A Level - IT - Network Security

CAMBRIDGE - A Level - IT - Network Security

12th Grade - Professional Development

15 Qs

IT General Control

IT General Control

Professional Development

10 Qs

Encryption

Encryption

Professional Development

15 Qs

SEC+ Ch.10 Review Test

SEC+ Ch.10 Review Test

Professional Development

15 Qs

Intro to Cybersecurity 3

Intro to Cybersecurity 3

12th Grade - Professional Development

12 Qs

Cyber Security Training Part 2 & 3

Cyber Security Training Part 2 & 3

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Paramita Sari

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is a recommended practice for creating strong passwords?

Using easily guessable information like birthdates

Using the same password across multiple accounts

Including a mix of uppercase, lowercase, numbers, and symbols

Sharing passwords with trusted friends and family

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is two-factor authentication (2FA) used for in account security?

To complicate the login process

To provide an additional layer of security beyond a password

To reset forgotten passwords

To monitor user activity

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

In RBAC, what is the role of an "administrator" typically associated with?

Limited access to system resources

Managing user accounts and permissions

Creating complex passwords

Conducting phishing awareness training

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Baiting in social engineering?

Use a fabricated story to gain victim’s trust. Pretexting attack can be done online, in person, or over the phone.

Offering something enticing, such as free software, a USB drive or money.

Sending fake emails, messages, or websites that appear legitimate.

Offering something enticing, such as free software, a USB drive or money.

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

In RBAC, what is the purpose of the principle of least privilege?

To grant users the maximum level of access by default

To provide unlimited privileges to all users

To randomly assign access privileges

To restrict users' access rights to the minimum necessary for their roles

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a red flag of a potential phishing email?

Urgent language and threats of account closure

Personalized greetings

Requests for regular password changes

Clearly identified sender information

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the purpose of data classification?

Deleting unnecessary data

Categorizing data based on its sensitivity and importance

Sharing all data with all users

Ignoring data security measures

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?