Week 3 Cyber Hygiene Quiz

Week 3 Cyber Hygiene Quiz

Professional Development

10 Qs

quiz-placeholder

Similar activities

Week 2 CyberHER Quiz 3

Week 2 CyberHER Quiz 3

Professional Development

10 Qs

Labor and Working Conditions

Labor and Working Conditions

Professional Development

9 Qs

Guidance and Counselling Quiz

Guidance and Counselling Quiz

Professional Development

10 Qs

Pre-Post Test In House Training PPI

Pre-Post Test In House Training PPI

Professional Development

15 Qs

Hygiene & Sanitation during Logistic

Hygiene & Sanitation during Logistic

Professional Development

10 Qs

Monkeypox Training Pre-Test

Monkeypox Training Pre-Test

Professional Development

10 Qs

btd6

btd6

KG - Professional Development

8 Qs

quiz 2

quiz 2

University - Professional Development

10 Qs

Week 3 Cyber Hygiene Quiz

Week 3 Cyber Hygiene Quiz

Assessment

Quiz

Science

Professional Development

Hard

Created by

Nisha Rawindaran

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Clicking on links or attachments in suspicious emails is an example of what?

Safe Browsing

Cyber Hygiene Best Practice

Cyber Hygiene Mistake

Secure Communication

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a common cyber hygiene mistake?

Reusing Passwords

Using Outdated Software

Regularly Updating Software

Not Using Antivirus Software

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you avoid to maintain good cyber hygiene?

Using Strong Passwords

Clicking on Suspicious Links

Regularly Backing Up Data

Using Secure Networks

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a consequence of using unsecured Wi-Fi networks in public places?

Enhanced Security

Data Breach

Improved Performance

Better User Experience

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a good cyber hygiene practice?

Granting Excessive Permissions

Using Outdated Software

Regularly Updating Antivirus Software

Clicking on Suspicious Links

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a potential risk of granting excessive permissions to applications?

Improved Security

Enhanced Performance

Compromised Privacy

Better User Experience

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which component of the ROHAN model emphasizes keeping up to date with the checklist provided by "The Golden Hub"?

Holistic Approach

Ownership

Nurture

Awareness, Adaptation, Assessment

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?