Cyber Security Training Part 2 & 3

Cyber Security Training Part 2 & 3

Professional Development

10 Qs

quiz-placeholder

Similar activities

Practice Quiz

Practice Quiz

Professional Development

10 Qs

Cyber Security ISA WRTD

Cyber Security ISA WRTD

Professional Development

11 Qs

Security Awareness Training

Security Awareness Training

Professional Development

10 Qs

Chapter 8 - Cloud Computing

Chapter 8 - Cloud Computing

Professional Development

15 Qs

 Review ITNS 2 part 2

Review ITNS 2 part 2

9th Grade - Professional Development

13 Qs

Mitigation Techniques and Controls

Mitigation Techniques and Controls

Professional Development

10 Qs

Amazon Managed Service for Grafana

Amazon Managed Service for Grafana

Professional Development

10 Qs

System Ethical Hacking

System Ethical Hacking

Professional Development

10 Qs

Cyber Security Training Part 2 & 3

Cyber Security Training Part 2 & 3

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Paramita Sari

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is a recommended practice for creating strong passwords?

Using easily guessable information like birthdates

Using the same password across multiple accounts

Including a mix of uppercase, lowercase, numbers, and symbols

Sharing passwords with trusted friends and family

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is two-factor authentication (2FA) used for in account security?

To complicate the login process

To provide an additional layer of security beyond a password

To reset forgotten passwords

To monitor user activity

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

In RBAC, what is the role of an "administrator" typically associated with?

Limited access to system resources

Managing user accounts and permissions

Creating complex passwords

Conducting phishing awareness training

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Baiting in social engineering?

Use a fabricated story to gain victim’s trust. Pretexting attack can be done online, in person, or over the phone.

Offering something enticing, such as free software, a USB drive or money.

Sending fake emails, messages, or websites that appear legitimate.

Offering something enticing, such as free software, a USB drive or money.

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

In RBAC, what is the purpose of the principle of least privilege?

To grant users the maximum level of access by default

To provide unlimited privileges to all users

To randomly assign access privileges

To restrict users' access rights to the minimum necessary for their roles

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a red flag of a potential phishing email?

Urgent language and threats of account closure

Personalized greetings

Requests for regular password changes

Clearly identified sender information

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the purpose of data classification?

Deleting unnecessary data

Categorizing data based on its sensitivity and importance

Sharing all data with all users

Ignoring data security measures

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?