
How Cyber Safe Are You?
Authored by Crystal Eleanor
Information Technology (IT)
University
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is the BEST definition of Cybersecurity?
Cybersecurity is the practice of protecting systems, networks, and data from digital attacks, unauthorized access, and damage.
Cybersecurity is solely focused on preventing hackers from accessing social media accounts.
Cybersecurity involves tracking and monitoring people’s online activity to ensure compliance.
Cybersecurity is the study of programming languages to build secure websites.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following BEST describes phishing?
Phishing is a method of encrypting data to protect it from unauthorized access.
Phishing is a cyberattack where attackers pose as legitimate entities to trick individuals into revealing sensitive information.
Phishing is a method hackers use to gain physical access to a restricted area by tricking security personnel.
Phishing is an email filtering system designed to block spam messages.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A cybercriminal illegally accesses a computer, encrypts the user's files and data, and demands a ransom for the user to regain access. What is this practice called?
Spyware
Phishing
Ransomware
Baiting
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What social engineering tactic uses SMS to trick individuals into disclosing sensitive information?
Quid Pro Quo
Vishing
Spear phishing
Smishing
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of a firewall in cybersecurity?
To monitor and control incoming and outgoing network traffic based on predetermined security rules.
To encrypt sensitive data during transmission over the internet.
To perform regular backups of all user data to prevent loss.
To remove malware from devices connected to the network.
6.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following demonstrates cyber-safe behavior? (Select TWO that apply)
Clicking on links in unsolicited emails.
Using 2FA on important accounts.
Regularly updating software and security applications.
Sharing personal information on social media.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A typical ransom note from ransomware often include:
Contact details for technical support.
A list of free recovery options.
Advice on updating software.
Instructions on how to pay the ransom and recover the encrypted files.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Computer Networking
Quiz
•
University
10 questions
POST-TEST
Quiz
•
University
10 questions
Week2 上周知识点回顾
Quiz
•
University
15 questions
LibreOffice Writer Styles Quiz
Quiz
•
10th Grade - University
15 questions
Java_MCQ_3
Quiz
•
University
15 questions
Questionário sobre Inteligência Artificial
Quiz
•
University
12 questions
PYTHON APTITUDE
Quiz
•
University
15 questions
Qual a sua próxima certificação?
Quiz
•
University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
10 questions
Probability Practice
Quiz
•
4th Grade
15 questions
Probability on Number LIne
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
6 questions
Appropriate Chromebook Usage
Lesson
•
7th Grade
10 questions
Greek Bases tele and phon
Quiz
•
6th - 8th Grade
Discover more resources for Information Technology (IT)
12 questions
IREAD Week 4 - Review
Quiz
•
3rd Grade - University
20 questions
Endocrine System
Quiz
•
University
7 questions
Renewable and Nonrenewable Resources
Interactive video
•
4th Grade - University
30 questions
W25: PSYCH 250 - Exam 2 Practice
Quiz
•
University
5 questions
Inherited and Acquired Traits of Animals
Interactive video
•
4th Grade - University
20 questions
Implicit vs. Explicit
Quiz
•
6th Grade - University
7 questions
Comparing Fractions
Interactive video
•
1st Grade - University
38 questions
Unit 8 Review - Absolutism & Revolution
Quiz
•
10th Grade - University