
Cybersecurity Best Practices and Awareness Quiz
Authored by Amiru Wijayasiriwardhane
Computers
12th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 10 pts
1. What is considered a strong password?
1. What is considered a strong password?
1. Your pet’s name followed by your birth year
2. A sequence of consecutive numbers (e.g., 123456)
3. A mix of uppercase and lowercase letters, numbers, and symbols
4. Your favorite movie title
2.
MULTIPLE CHOICE QUESTION
30 sec • 10 pts
2. Which of the following is a sign of a phishing email?
2. Which of the following is a sign of a phishing email?
1. The email is from a company you recognize
2. The email has no spelling or grammar mistakes
3. The email asks you to verify your account by clicking on a link
4. The email is addressed to you by name
3.
MULTIPLE CHOICE QUESTION
30 sec • 10 pts
3. What does encryption do to your data?
3. What does encryption do to your data?
1. Makes it heavier
2. transforms it into an unreadable format until decrypted
3. Deletes it after a certain period
4. Makes it public.
5.
MULTIPLE CHOICE QUESTION
30 sec • 10 pts
5. What is social engineering in the context of cybersecurity?
5. What is social engineering in the context of cybersecurity?
1. Building social networks for better communication
2. Manipulating people into giving out confidential information
3. Engineering social media algorithms
4. Socializing with engineers
6.
MULTIPLE CHOICE QUESTION
30 sec • 10 pts
6. What is a risk of using unsecured public Wi-Fi?
6. What is a risk of using unsecured public Wi-Fi?
A) Slow connection speed
C) Battery drains faster
B) Data interception by cybercriminals
D) Limited access to websites
7.
MULTIPLE CHOICE QUESTION
30 sec • 10 pts
7. What is the purpose of 2FA? (Two-Factor Authentication)
7. What is the purpose of 2FA? (Two-Factor Authentication)
A) To make logging in more complicated
B) To provide an extra layer of security
C) To track your login locations
D) To store passwords securely
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?