Search Header Logo

Awareness

Authored by mohammad bahloul

Information Technology (IT)

Professional Development

Awareness
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What should you do if you receive an email from an unknown sender with an attachment?

Open it to check the contents.

Delete it without reading.

Verify the sender’s email address and report it to IT if suspicious.

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is a best practice for creating a secure password?

Use a single word with no numbers or symbols.

Use a long passphrase with a mix of letters, numbers, and symbols.

Use the same password for all accounts for easy recall.

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

When should you connect to a VPN?

Only when working from home.

When accessing company systems over public Wi-Fi.

Only if it’s a critical task.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the best action to take when stepping away from your desk?

Leave your computer unlocked since you’ll be back soon.

Lock your screen or log out of your session.

Turn off your monitor.

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Why is it important to regularly back up critical data?

To ensure that data can be restored if it’s lost or corrupted.

So you don’t have to save files in secure locations.

To create extra copies of data that can be shared easily.

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What should you do if a colleague asks for your login credentials to complete a task?

Politely refuse and suggest they contact IT for access.

Share your password with them and change it later.

Write it down and leave it on their desk for convenience.

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the best way to handle sensitive printed documents at your workstation?

Leave them on your desk in case you need them later.

Secure them in a locked drawer or file cabinet when not in use.

Stack them with other non-sensitive documents.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?