Search Header Logo

CYBERSECURITY AWARENESS TRAINING QUIZ - 01

Authored by Muhammad Al-Amirul

Computers

11th Grade

Used 4+ times

CYBERSECURITY AWARENESS TRAINING QUIZ - 01
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of cybersecurity?

  • Cybersecurity refers to protecting your photos, audios and texts in your devices from being stolen

  • Cybersecurity refers to protecting systems, networks, and data from cyber threats such as hacking, phishing, malware, and ransomware.

  • Cybersecurity refers to protecting country's confidential information from being hacked by other countries

  • Cybersecurity refers to protecting your family and friends from being blackmailed by the irresponsibility personnel who are aiming for the money

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What does MALWARE stands for?

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Answer YES or NO to the following statement:

  • "Cyber threats can cause financial losses, data breaches, and damage to a company’s reputation"

YES

NO

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following is the importance aspects of Cybersecurity based on topic?

Financial and Reputational Damage

Money shortage

Social Media Hate

Misinformation

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Phishing?

  • Malware that locks your files and demands payment for access.

  • Fraudulent emails or messages designed to trick you into revealing sensitive information.

  • Malicious software that infects systems, often leading to data theft or loss.

  • Manipulating individuals into divulging confidential information.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How would you know if you have been infected by the RANSOMWARE?

  • It will infect your systems, often leading to data theft or loss.

  • It will manipulate you into divulging confidential information.

  • It will LOCK your files and demands payment for access.

It will ask for your credit card and phone number

7.

DRAG AND DROP QUESTION

1 min • 1 pt

(Drag and Drop from the answers below)

To create a strong password, we need to consider the ​ (a)   of password, enabling the ​ (b)   , character​ (c)   , utilize ​ (d)   and​ avoid​ (e)   .

length
two-form factors
variety
password manager
predictibility

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?