CYBERSECURITY AWARENESS TRAINING

CYBERSECURITY AWARENESS TRAINING

Professional Development

10 Qs

quiz-placeholder

Similar activities

UDC 2022

UDC 2022

Professional Development

10 Qs

Mastering KineMaster

Mastering KineMaster

Professional Development

10 Qs

KOE034: Sensors and Instruments

KOE034: Sensors and Instruments

Professional Development

11 Qs

OWASP Top 10

OWASP Top 10

Professional Development

10 Qs

Computer Hardware and Software Quiz

Computer Hardware and Software Quiz

Professional Development

10 Qs

Python Test 1

Python Test 1

Professional Development

10 Qs

Gen. Assembly Recap Day 1

Gen. Assembly Recap Day 1

Professional Development

15 Qs

JDBC_Objective_Exam_2

JDBC_Objective_Exam_2

Professional Development

15 Qs

CYBERSECURITY AWARENESS TRAINING

CYBERSECURITY AWARENESS TRAINING

Assessment

Quiz

Computers

Professional Development

Practice Problem

Hard

Created by

F1080 Suvendran

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the “https://” at the beginning of a URL denote, as opposed to "http://" (without the “s”)?    Apakah yang dimaksudkan oleh “https://” pada permulaan URL, berbanding dengan "http://" (tanpa “s”)?

That the site has special high definition


That information entered into the site is encrypted


That the site is the newest version available


That the site is not accessible to certain computers


None of the above


2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

 

Which of the following is an example of a “phishing” attack? Antara berikut, yang manakah merupakan contoh serangan "phishing"?

Sending someone an email that contains a malicious link that is disguised to look like an email from someone the person knows


Creating a fake website that looks nearly identical to a real website in order to trick users into entering their login information


Sending someone a text message that contains a malicious link that is disguised to look like a notification that the person has won a contest


All of the asnwers


Not sure


3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A group of computers that is networked together and used by hackers to steal information is called a …? Sekumpulan komputer yang dirangkaikan bersama dan digunakan oleh penggodam untuk mencuri maklumat dipanggil .. ?

Botnet


Rootkit

DDoS

Not sure


4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Criminal’s access someone’s computer and encrypt the user’s personal files and data. The user is unable to access this data unless they pay the criminals to decrypt the files. This practice is called …? Penjenayah mengakses komputer seseorang dan menyulitkan fail dan data peribadi pengguna. Pengguna tidak dapat mengakses data ini melainkan mereka membayar penjenayah untuk menyahsulit fail. Amalan ini dinamakan…

Botnet


Ransomware


Driving


Spam


None of the above


5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following four passwords is the most secure? Manakah antara empat kata laluan berikut yang paling selamat?

Boat123


WTh!5Z


into*48


123456


Not sure


6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Turning off the GPS function of your smartphone prevents any tracking of your phone’s location.  Mematikan fungsi GPS telefon pintar anda menghalang sebarang pengesanan lokasi telefon anda.

True


False


Not sure


Answer explanation

* In addition to GPS, smartphones can also be tracked using the cellphone towers or Wi-Fi networks that the phone is connected to.


7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If a public Wi-Fi network (such as in an College or café) requires a password to access, is it generally safe to use that network for sensitive activities such as online banking?Jika rangkaian Wi-Fi awam (seperti Kolej atau kafe) memerlukan kata laluan untuk mengakses, adakah secara amnya selamat untuk menggunakan rangkaian itu untuk aktiviti sensitif seperti perbankan dalam talian?

Yes, it is safe


No, it is not safe


Not sure


Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?