Cybersecurity Awareness Quiz

Cybersecurity Awareness Quiz

Professional Development

15 Qs

quiz-placeholder

Similar activities

ICT

ICT

KG - Professional Development

11 Qs

AutoNation-Live Person Connect

AutoNation-Live Person Connect

Professional Development

11 Qs

INFOSEC WEEK DAY 5 QUIZ

INFOSEC WEEK DAY 5 QUIZ

Professional Development

10 Qs

INFOSEC WEEK DAY 3

INFOSEC WEEK DAY 3

Professional Development

10 Qs

Nursing Informatics (Nurses/PSA/OA/OT)

Nursing Informatics (Nurses/PSA/OA/OT)

Professional Development

15 Qs

Cyber Security

Cyber Security

Professional Development

10 Qs

Google Classroom knowledge

Google Classroom knowledge

Professional Development

10 Qs

Writing an Email

Writing an Email

Professional Development

10 Qs

Cybersecurity Awareness Quiz

Cybersecurity Awareness Quiz

Assessment

Quiz

Other

Professional Development

Hard

Created by

Breegan Arnett

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you do if you receive an email from an unknown sender that asks you to click a link or download an attachment?

Open the email and click the link

Ignore it and delete the email

Reply asking for more details

Click the link but do not download anything

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of multi-factor authentication (MFA)?

To make it easier to log in to your accounts

To enhance the security of your login by requiring additional verification

To keep track of your passwords

To change your password regularly

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the best practice when creating a password?

Use your birthdate or simple words

Use a mix of uppercase, lowercase, numbers, and special characters

Use the same password for multiple accounts

Write your password down and keep it in a drawer

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term "phishing" refer to in cybersecurity?

An attack that spreads viruses through websites

A method of stealing personal information through fraudulent emails or websites

A technique for securing wireless networks

A way to block spam emails

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of sensitive data?

A random image you found on the internet

Your work schedule

A list of employee social security numbers

A company-wide meeting invitation

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How often should you update your software and applications (including operating system)?

Once a year

Every six months

As soon as updates are available

Only when you encounter a problem

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If your computer or device shows signs of being infected with malware, what should you do first?

Restart your computer

Disconnect from the internet and run a virus scan

Ignore it and continue working

Contact IT support only if the problem worsens

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?