Search Header Logo

Cybersecurity

Authored by Lanz Nieva

Computers

University

Used 3+ times

Cybersecurity
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is phishing?

A type of social gathering

A method of tricking individuals into revealing sensitive information

A computer virus

A type of encryption algorithm

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of social engineering?

Installing antivirus software

Sending deceptive emails to obtain passwords

Updating operating systems regularly

Using a firewall to protect against hackers

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ransomware is a type of malicious software that:

Steals credit card information

Encrypts files and demands payment for their release

Deletes system files

Spreads through social media platforms

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of malware?

To improve computer performance

To steal personal information

To enhance cybersecurity

To provide free software to users

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can users protect themselves from phishing attacks?

Click on links in emails without verifying the sender

Share personal information freely on social media

Ignore suspicious emails and not click on unknown links

Provide banking details to anyone who asks for them

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a common social engineering tactic?

Impersonating a trusted individual or organization

Offering free software downloads

Creating a sense of urgency or fear

Sending malicious attachments via email

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best course of action if you suspect you have fallen victim to ransomware?

Pay the ransom immediately to regain access to your files

Contact law enforcement and report the incident

Disconnect the infected device from the internet and seek professional assistance

Ignore the situation and hope it resolves itself

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?