CYBERSECURITY AWARENESS TRAINING

CYBERSECURITY AWARENESS TRAINING

Professional Development

10 Qs

quiz-placeholder

Similar activities

HP Commercial Product Training Quiz

HP Commercial Product Training Quiz

Professional Development

10 Qs

How Well Do You Them?

How Well Do You Them?

Professional Development

10 Qs

Python Data Structures & Statements

Python Data Structures & Statements

Professional Development

11 Qs

PLAL Agile Onboarding

PLAL Agile Onboarding

Professional Development

10 Qs

Exam Prep 1

Exam Prep 1

Professional Development

10 Qs

2. Day 1_ITBA 10 Soal

2. Day 1_ITBA 10 Soal

KG - Professional Development

10 Qs

Menulis Gambar

Menulis Gambar

1st Grade - Professional Development

15 Qs

social engineering

social engineering

1st Grade - Professional Development

10 Qs

CYBERSECURITY AWARENESS TRAINING

CYBERSECURITY AWARENESS TRAINING

Assessment

Quiz

Computers

Professional Development

Practice Problem

Hard

Created by

F1080 Suvendran

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the “https://” at the beginning of a URL denote, as opposed to "http://" (without the “s”)?    Apakah yang dimaksudkan oleh “https://” pada permulaan URL, berbanding dengan "http://" (tanpa “s”)?

That the site has special high definition


That information entered into the site is encrypted


That the site is the newest version available


That the site is not accessible to certain computers


None of the above


2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

 

Which of the following is an example of a “phishing” attack? Antara berikut, yang manakah merupakan contoh serangan "phishing"?

Sending someone an email that contains a malicious link that is disguised to look like an email from someone the person knows


Creating a fake website that looks nearly identical to a real website in order to trick users into entering their login information


Sending someone a text message that contains a malicious link that is disguised to look like a notification that the person has won a contest


All of the asnwers


Not sure


3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A group of computers that is networked together and used by hackers to steal information is called a …? Sekumpulan komputer yang dirangkaikan bersama dan digunakan oleh penggodam untuk mencuri maklumat dipanggil .. ?

Botnet


Rootkit

DDoS

Not sure


4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Criminal’s access someone’s computer and encrypt the user’s personal files and data. The user is unable to access this data unless they pay the criminals to decrypt the files. This practice is called …? Penjenayah mengakses komputer seseorang dan menyulitkan fail dan data peribadi pengguna. Pengguna tidak dapat mengakses data ini melainkan mereka membayar penjenayah untuk menyahsulit fail. Amalan ini dinamakan…

Botnet


Ransomware


Driving


Spam


None of the above


5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following four passwords is the most secure? Manakah antara empat kata laluan berikut yang paling selamat?

Boat123


WTh!5Z


into*48


123456


Not sure


6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Turning off the GPS function of your smartphone prevents any tracking of your phone’s location.  Mematikan fungsi GPS telefon pintar anda menghalang sebarang pengesanan lokasi telefon anda.

True


False


Not sure


Answer explanation

* In addition to GPS, smartphones can also be tracked using the cellphone towers or Wi-Fi networks that the phone is connected to.


7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If a public Wi-Fi network (such as in an College or café) requires a password to access, is it generally safe to use that network for sensitive activities such as online banking?Jika rangkaian Wi-Fi awam (seperti Kolej atau kafe) memerlukan kata laluan untuk mengakses, adakah secara amnya selamat untuk menggunakan rangkaian itu untuk aktiviti sensitif seperti perbankan dalam talian?

Yes, it is safe


No, it is not safe


Not sure


Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?