Search Header Logo

Cyber Security Training Part 2 & 3

Authored by Paramita Sari

Computers

Professional Development

Used 1+ times

Cyber Security Training Part 2 & 3
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is a recommended practice for creating strong passwords?

Using easily guessable information like birthdates

Using the same password across multiple accounts

Including a mix of uppercase, lowercase, numbers, and symbols

Sharing passwords with trusted friends and family

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is two-factor authentication (2FA) used for in account security?

To complicate the login process

To provide an additional layer of security beyond a password

To reset forgotten passwords

To monitor user activity

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

In RBAC, what is the role of an "administrator" typically associated with?

Limited access to system resources

Managing user accounts and permissions

Creating complex passwords

Conducting phishing awareness training

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Baiting in social engineering?

Use a fabricated story to gain victim’s trust. Pretexting attack can be done online, in person, or over the phone.

Offering something enticing, such as free software, a USB drive or money.

Sending fake emails, messages, or websites that appear legitimate.

Offering something enticing, such as free software, a USB drive or money.

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

In RBAC, what is the purpose of the principle of least privilege?

To grant users the maximum level of access by default

To provide unlimited privileges to all users

To randomly assign access privileges

To restrict users' access rights to the minimum necessary for their roles

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a red flag of a potential phishing email?

Urgent language and threats of account closure

Personalized greetings

Requests for regular password changes

Clearly identified sender information

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the purpose of data classification?

Deleting unnecessary data

Categorizing data based on its sensitivity and importance

Sharing all data with all users

Ignoring data security measures

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?