Cybersecurity Assessment

Cybersecurity Assessment

Professional Development

8 Qs

quiz-placeholder

Similar activities

Traditional SIEM VS Splunk For Security

Traditional SIEM VS Splunk For Security

Professional Development

10 Qs

Quiz | Seminar " Advanced Security Operations Center "

Quiz | Seminar " Advanced Security Operations Center "

Professional Development

13 Qs

Web Browsers

Web Browsers

Professional Development

10 Qs

Cyber Security

Cyber Security

Professional Development

10 Qs

Basic Introduction Of hacking

Basic Introduction Of hacking

Professional Development

10 Qs

NE Pilot

NE Pilot

Professional Development

9 Qs

Focus Group Knowledge Check September

Focus Group Knowledge Check September

Professional Development

11 Qs

ITF - Quiz 12.2 - Windows File Sharing

ITF - Quiz 12.2 - Windows File Sharing

Professional Development

11 Qs

Cybersecurity Assessment

Cybersecurity Assessment

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Lindsey Grow

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Najmo created a password with her name and her favorite sport.  Her password is NajmoSoccer.  Why should Najmo choose a different password?
It's too long.
It uses her name.
It uses her name and doesn't use symbols or numbers.

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A strong password is better with;
A simple password based on interests.
A password no one would relate to you but you can remember.
A complicated password you may forget.
A combination of letters, numbers & special characters

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is an example of a secure password?

Bailey123

Pl@Yn!ce529

Password1

admin83

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A secure password should include:

your name

pet's name

a date

passphrases

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What should you look for to determine if an email is a phishing scam? Choose all that apply

suspicious links

trustworthy vs. unfamiliar sender

the date it was sent

language such as "urgent" or "immediately"

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Is this a possible phishing email?

Yes

No

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which are actions that can lead to an insider threat? Choose all that apply.

Downloading classified information onto a personal device

Asking a coworker for help

sharing credentials

Sharing information in a meeting

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False: An insider threat can happen unintentionally.

True

False