2 - Cybersecurity 101

2 - Cybersecurity 101

9th Grade

20 Qs

quiz-placeholder

Similar activities

email protocols

email protocols

University

20 Qs

Year 8 Computing - Cyber Crime

Year 8 Computing - Cyber Crime

8th - 9th Grade

20 Qs

Fundamentals of Cyber Security

Fundamentals of Cyber Security

10th Grade

15 Qs

Cyber security

Cyber security

10th - 11th Grade

19 Qs

Cyber Safety

Cyber Safety

9th - 12th Grade

17 Qs

Outlook Ch. 1

Outlook Ch. 1

8th - 9th Grade

20 Qs

Unit 5 - Network Protocols

Unit 5 - Network Protocols

9th - 11th Grade

24 Qs

2 - Cybersecurity 101

2 - Cybersecurity 101

Assessment

Quiz

Computers

9th Grade

Medium

Created by

JEREMY MCINTYRE

Used 5+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of these statements is correct?

If you get an email that looks like it's from someone you know, you can click on any links as long as you have a spam blocker and anti-virus protection.

You can trust an email really comes from a client if it uses the client's logo and contains at least one fact about the client that you know to be true.

If you get a message from a colleague who needs your network password, you should never give ti out unless the colleague says it's an emergency.

If you get an email from Human Resources asking you to provide personal information right away, you should check it out first to make sure they are who they say they are.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An email from your boss asks for the name, addresses, and credit card information of the company’s top clients. The email says it’s urgent and to please reply right away. You should reply right away. True or False?

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You get a text message from a vendor who asks you to click on a link to renew your password so that you can log in to its website. You should:

Reply to the text to confirm that you really need to renew your password.

Pick up the phone and call the vendor, using a phone number you know to be correct, to confirm that the request is real.

Click on the link. If it takes you to the vendor's website, then you'll know it's not a scam.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Email authentication can help protect against phishing attacks. True or False?

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If you fall for a phishing scam, what should you do to limit the damage?

Delete the phishing email.

Unplug the computer. This will get rid of any malware.

Change any compromised passwords.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following should you do to restrict access to your files and devices?

Update your software once a year.

Share passwords only with colleagues you trust.

Have your staff members access information via an open Wi-Fi network.

Use multi-factor authentication.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Backing up important files offline, on an external hard drive or in the cloud, will help protect your business in the event of a cyber attack. True or False?

True

False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?