
Cyber Security Awareness - SSIT

Quiz
•
Computers
•
•
Medium
Chuong Nguyen
Used 2+ times
FREE Resource
12 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a good way to create a password?
Your children’s or pet’s names
Using look-alike substitutions of numbers or symbols
A combination of upper and lowercase letters mixed with numbers and symbols
Using common names or words from the dictionary
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When receiving an email from an unknown contact that has an attachment, you should:
Open the attachment to view its contents
Delete the email
Forward the email to your co-workers to allow them to open the attachment first
Forward the email to your personal email account so you can open it at home
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a good practice to avoid email viruses?
Delete an unexpected or unsolicited message
Use anti-virus software to scan attachments before opening
Delete similar messages that appears more than once in your inbox
All the above
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a proper use of email?
Never email personal information
Send out pricelists for your home-based business products
Forward inspirational and humorous emails to your co-workers to brighten their day
Send an email to all your friends and co-workers to advertise a job opening in your area
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Instant Messaging is safer than regular email.
True
False
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which statement most accurately describe the virus?
A program that is secretly installed onto your computer and makes copies of itself which consumes your computer resources.
A program that protects your computer from hackers.
A program that is installed onto your computer that monitors your internet use
All of the above
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following is a measure for preventing a social engineering attack:
Do not give out computer or network information
Do not complete confidential company tasks in an unsecure setting
Do not secure sensitive documents and media
Do not give out personal identifiable information.
Create a free account and access millions of resources
Similar Resources on Wayground
16 questions
CyberSafety Pre-Assessment

Quiz
•
KG - University
10 questions
Information Security Basics

Quiz
•
KG
10 questions
Y8 Computer crime 2

Quiz
•
7th - 9th Grade
15 questions
Hackers and Malware

Quiz
•
8th Grade
15 questions
ICT

Quiz
•
6th - 10th Grade
15 questions
IT Security & Encryption of Data

Quiz
•
8th - 10th Grade
10 questions
Cyber Security

Quiz
•
5th - 8th Grade
13 questions
Cloud services

Quiz
•
9th - 10th Grade
Popular Resources on Wayground
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
12 questions
Exponent Expressions

Quiz
•
6th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
20 questions
One Step Equations All Operations

Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade
Discover more resources for Computers
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
12 questions
Exponent Expressions

Quiz
•
6th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
20 questions
One Step Equations All Operations

Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade