Search Header Logo

CYBERSECURITY AWARENESS TRAINING

Authored by F1080 Suvendran

Computers

Professional Development

CYBERSECURITY AWARENESS TRAINING
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the “https://” at the beginning of a URL denote, as opposed to "http://" (without the “s”)?    Apakah yang dimaksudkan oleh “https://” pada permulaan URL, berbanding dengan "http://" (tanpa “s”)?

That the site has special high definition


That information entered into the site is encrypted


That the site is the newest version available


That the site is not accessible to certain computers


None of the above


2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

 

Which of the following is an example of a “phishing” attack? Antara berikut, yang manakah merupakan contoh serangan "phishing"?

Sending someone an email that contains a malicious link that is disguised to look like an email from someone the person knows


Creating a fake website that looks nearly identical to a real website in order to trick users into entering their login information


Sending someone a text message that contains a malicious link that is disguised to look like a notification that the person has won a contest


All of the asnwers


Not sure


3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A group of computers that is networked together and used by hackers to steal information is called a …? Sekumpulan komputer yang dirangkaikan bersama dan digunakan oleh penggodam untuk mencuri maklumat dipanggil .. ?

Botnet


Rootkit

DDoS

Not sure


4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Criminal’s access someone’s computer and encrypt the user’s personal files and data. The user is unable to access this data unless they pay the criminals to decrypt the files. This practice is called …? Penjenayah mengakses komputer seseorang dan menyulitkan fail dan data peribadi pengguna. Pengguna tidak dapat mengakses data ini melainkan mereka membayar penjenayah untuk menyahsulit fail. Amalan ini dinamakan…

Botnet


Ransomware


Driving


Spam


None of the above


5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following four passwords is the most secure? Manakah antara empat kata laluan berikut yang paling selamat?

Boat123


WTh!5Z


into*48


123456


Not sure


6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Turning off the GPS function of your smartphone prevents any tracking of your phone’s location.  Mematikan fungsi GPS telefon pintar anda menghalang sebarang pengesanan lokasi telefon anda.

True


False


Not sure


Answer explanation

* In addition to GPS, smartphones can also be tracked using the cellphone towers or Wi-Fi networks that the phone is connected to.


7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If a public Wi-Fi network (such as in an College or café) requires a password to access, is it generally safe to use that network for sensitive activities such as online banking?Jika rangkaian Wi-Fi awam (seperti Kolej atau kafe) memerlukan kata laluan untuk mengakses, adakah secara amnya selamat untuk menggunakan rangkaian itu untuk aktiviti sensitif seperti perbankan dalam talian?

Yes, it is safe


No, it is not safe


Not sure


Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?