Cybersecurity Assessment

Cybersecurity Assessment

Professional Development

8 Qs

quiz-placeholder

Similar activities

Cyber quiz

Cyber quiz

Professional Development

10 Qs

Connecting to a Database using PHP

Connecting to a Database using PHP

Professional Development

9 Qs

Python Programming 2

Python Programming 2

9th Grade - Professional Development

11 Qs

Traditional SIEM VS Splunk For Security

Traditional SIEM VS Splunk For Security

Professional Development

10 Qs

Password Safety & Security

Password Safety & Security

KG - Professional Development

11 Qs

Web Browsers

Web Browsers

Professional Development

10 Qs

IT General Control

IT General Control

Professional Development

10 Qs

NE Pilot

NE Pilot

Professional Development

9 Qs

Cybersecurity Assessment

Cybersecurity Assessment

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Lindsey Grow

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Najmo created a password with her name and her favorite sport.  Her password is NajmoSoccer.  Why should Najmo choose a different password?
It's too long.
It uses her name.
It uses her name and doesn't use symbols or numbers.

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A strong password is better with;
A simple password based on interests.
A password no one would relate to you but you can remember.
A complicated password you may forget.
A combination of letters, numbers & special characters

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is an example of a secure password?

Bailey123

Pl@Yn!ce529

Password1

admin83

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A secure password should include:

your name

pet's name

a date

passphrases

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What should you look for to determine if an email is a phishing scam? Choose all that apply

suspicious links

trustworthy vs. unfamiliar sender

the date it was sent

language such as "urgent" or "immediately"

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Is this a possible phishing email?

Yes

No

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which are actions that can lead to an insider threat? Choose all that apply.

Downloading classified information onto a personal device

Asking a coworker for help

sharing credentials

Sharing information in a meeting

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False: An insider threat can happen unintentionally.

True

False