
Cybersecurity Assessment
Authored by Lindsey Grow
Computers
Professional Development

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
8 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Najmo created a password with her name and her favorite sport. Her password is NajmoSoccer. Why should Najmo choose a different password?
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
A strong password is better with;
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which is an example of a secure password?
Bailey123
Pl@Yn!ce529
Password1
admin83
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A secure password should include:
your name
pet's name
a date
passphrases
5.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What should you look for to determine if an email is a phishing scam? Choose all that apply
suspicious links
trustworthy vs. unfamiliar sender
the date it was sent
language such as "urgent" or "immediately"
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Is this a possible phishing email?
Yes
No
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which are actions that can lead to an insider threat? Choose all that apply.
Downloading classified information onto a personal device
Asking a coworker for help
sharing credentials
Sharing information in a meeting
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?