GROUP 1- QUIZ 2 EMPTECH

GROUP 1- QUIZ 2 EMPTECH

11th Grade

11 Qs

quiz-placeholder

Similar activities

Phishing Activity

Phishing Activity

6th - 12th Grade

14 Qs

M2 Social Engineering, Camb Nats

M2 Social Engineering, Camb Nats

9th - 12th Grade

12 Qs

Cybersecurity Basics Quiz

Cybersecurity Basics Quiz

6th Grade - University

15 Qs

Identity Theft

Identity Theft

9th - 12th Grade

15 Qs

Cybercrime

Cybercrime

KG - 12th Grade

8 Qs

scams

scams

9th Grade - University

10 Qs

Types of Attacks - Phishing

Types of Attacks - Phishing

9th - 12th Grade

10 Qs

CP10 May 13 Vocab

CP10 May 13 Vocab

9th - 12th Grade

7 Qs

GROUP 1- QUIZ 2 EMPTECH

GROUP 1- QUIZ 2 EMPTECH

Assessment

Quiz

Other

11th Grade

Medium

Created by

Qwnycy Carisma

Used 2+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A tactic where a victim is manipulated or deceived to gain control over a computer system or to steal personal and financial information.

Phishing Attack

Social Engineering

Identity Theft

Malware and Ransomware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a benefit of Two-Factor Authentication (2FA)?

Enhanced Security

User Trust and Compliance

Unauthorized Access

Reduced Risks of Identity Theft

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A form of malicious software used by cybercriminals to block access to data on infected devices or networks, demanding payment to restore access.

Phishing Attack

Social Engineering

Identity Theft

Malware and Ransomware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How should you properly manage your passwords?

Use the same password for multiple accounts.

Share your passwords with your friends.

Use your birthdate and name as your password.

  1. Generate strong, unique passwords for each site.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. What should you NOT do if you are a victim of an online threat?

  1. Change passwords immediately 

Ignore the threat and assume that it’s a prank.

  1. Notify relevant parties

  1. Report to authorities

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

  1. This refers to the digital realm created by the internet and computer networks, including online communication, social media, digital commerce, and virtual spaces. 

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

  1. A type of cyberattack where fraudulent emails, texts, calls, or websites are used to trick people into sharing sensitive data or downloading malware.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?