Awareness

Awareness

Professional Development

8 Qs

quiz-placeholder

Similar activities

OSS Security

OSS Security

Professional Development

6 Qs

Ethical Hacking Kali Linux Part 4

Ethical Hacking Kali Linux Part 4

Professional Development

10 Qs

How Cyber Safe Are You? Part 2

How Cyber Safe Are You? Part 2

Professional Development

10 Qs

Knowing the Cyber Threat

Knowing the Cyber Threat

Professional Development

6 Qs

Email Security (Pre)

Email Security (Pre)

Professional Development

6 Qs

Technical Knowledge

Technical Knowledge

Professional Development

11 Qs

3MTT Quiz Wednesday( Rivers State Community)

3MTT Quiz Wednesday( Rivers State Community)

Professional Development

10 Qs

Cybersecurity fun quiz

Cybersecurity fun quiz

Professional Development

11 Qs

Awareness

Awareness

Assessment

Quiz

Information Technology (IT)

Professional Development

Hard

Created by

mohammad bahloul

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What should you do if you receive an email from an unknown sender with an attachment?

Open it to check the contents.

Delete it without reading.

Verify the sender’s email address and report it to IT if suspicious.

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is a best practice for creating a secure password?

Use a single word with no numbers or symbols.

Use a long passphrase with a mix of letters, numbers, and symbols.

Use the same password for all accounts for easy recall.

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

When should you connect to a VPN?

Only when working from home.

When accessing company systems over public Wi-Fi.

Only if it’s a critical task.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the best action to take when stepping away from your desk?

Leave your computer unlocked since you’ll be back soon.

Lock your screen or log out of your session.

Turn off your monitor.

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Why is it important to regularly back up critical data?

To ensure that data can be restored if it’s lost or corrupted.

So you don’t have to save files in secure locations.

To create extra copies of data that can be shared easily.

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What should you do if a colleague asks for your login credentials to complete a task?

Politely refuse and suggest they contact IT for access.

Share your password with them and change it later.

Write it down and leave it on their desk for convenience.

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the best way to handle sensitive printed documents at your workstation?

Leave them on your desk in case you need them later.

Secure them in a locked drawer or file cabinet when not in use.

Stack them with other non-sensitive documents.

8.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What should you do if you notice unusual behavior on your work computer?

Try to troubleshoot the issue on your own.

Report it immediately to the IT department.

  • Ignore it unless it happens again.