Cyber Incident Quiz

Cyber Incident Quiz

12th Grade

15 Qs

quiz-placeholder

Similar activities

Phishing quiz

Phishing quiz

1st - 12th Grade

20 Qs

IC3 GS6 Level 1 Domain 2 Lesson 1

IC3 GS6 Level 1 Domain 2 Lesson 1

6th Grade - University

15 Qs

cyber security

cyber security

KG - Professional Development

14 Qs

Level 1 ICT: Security Quiz

Level 1 ICT: Security Quiz

12th Grade

12 Qs

Tech Tarik 2.0 : Phishing Awareness Quiz by CYBERHAX

Tech Tarik 2.0 : Phishing Awareness Quiz by CYBERHAX

University

13 Qs

Cyber Fun Password Attack Quiz

Cyber Fun Password Attack Quiz

9th Grade - University

20 Qs

social engineering

social engineering

1st Grade - Professional Development

10 Qs

Computer Security Risk

Computer Security Risk

12th Grade - University

16 Qs

Cyber Incident Quiz

Cyber Incident Quiz

Assessment

Quiz

Computers

12th Grade

Easy

Created by

chris jackman

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was the main type of cyber incident reported at CME?

Ransomware attack

Phishing email

Distributed Denial of Service (DDoS) attack

Malware infection

Answer explanation

The main type of cyber incident reported at CME was a phishing email, which is a common tactic used to deceive individuals into providing sensitive information, unlike ransomware or DDoS attacks.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which employee first reported the phishing incident?

Joanne Reedsman

Andrew Caelcabben

Chelsi Geongran

The electricians

Answer explanation

Chelsi Geongran was the first employee to report the phishing incident, making her the correct choice among the options provided.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What sensitive information was included in the phishing email?

Credit card numbers

Bank account details

User passwords

National Insurance Numbers

Answer explanation

The phishing email included user passwords, which are highly sensitive as they grant access to personal accounts. Other options like credit card numbers and Social Security Numbers were not specified as included in the email.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How were the compromised passwords likely obtained?

A keylogger on the system

A public data breach

CME's internal systems were hacked

Chelsi shared them with a colleague

Answer explanation

The compromised passwords were likely obtained through a public data breach, where user credentials are exposed and can be accessed by malicious actors. This is a common method for acquiring passwords.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was a key recommendation given to Chelsi regarding password management?

Use the same password for all accounts

Write down passwords in a notebook

Answer explanation

Writing down passwords in a notebook is a practical way to manage them securely, as it helps avoid forgetting them. Using the same password for all accounts is risky, and it's not advisable to rely solely on memory.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What could have prevented the phishing email from reaching Chelsi?

Multi-factor authentication

Advanced email filtering

Disabling internet access

Encrypted email communication

Answer explanation

Advanced email filtering could have identified and blocked the phishing email before it reached Chelsi's inbox, preventing potential harm. Other options do not directly stop the email from arriving.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does phishing primarily rely on to succeed?

Exploiting software vulnerabilities

Tricking users into providing sensitive information

Accessing encrypted files

Brute-forcing passwords

Answer explanation

Phishing primarily relies on tricking users into providing sensitive information, such as passwords or credit card details, often through deceptive emails or websites, rather than exploiting software vulnerabilities or using brute-force methods.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?