
Cybersecurity Quiz
Authored by P P
Instructional Technology
Professional Development
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
18 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which variation of phishing involves targeting only specific users?
Whaling
Vishing
Type squatting
Spear phishing
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Social media and social networking can be used interchangeably.
True
False
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The largest and most consequential cyber threats that face businesses and consumers is
typo squatting
phishing
hoaxes
password cracking
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Any password that is repeated on multiple accounts is a weak password.
True
False
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A program installed on a computer through which the user can create and store multiple strong passwords that is protected by one strong master password is known as which of the following?
Online vault
Password generator
Key file
Password Management Application
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When creating passwords, the most important principle is that complexity is more important than length.
True
False
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The available security settings in social networking sites are often updated frequently by the site.
True
False
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?