Cybersecurity_1

Quiz
•
Other
•
Professional Development
•
Easy
Rabab Elyass
Used 1+ times
FREE Resource
5 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What is the most common cyber threat?
Old Technological infrastructure
Weak passwords
Pizza
Human Error
Answer explanation
Human error is the biggest cybersecurity threat, responsible for 85% of data breaches. These errors, like clicking phishing links or sharing sensitive data, can lead to financial losses and reputational damage. Mitigation strategies include user education and training, along with safeguards like multi-factor authentication and Zero Trust data protection policies.
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following is a strong indicator of a phishing email?
the email is from a known and trusted sender.
The email contains generic greetings like "Dear Customer."
The email asks for your password or other sensitive information.
Both b and c.
Answer explanation
Phishing emails often use generic greetings and urgently request sensitive information, unlike legitimate emails from known senders.
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Social engineering is:
A type of computer programming.
The art of manipulating people into divulging sensitive information.
A software used to protect against viruses.
A type of network security protocol
Answer explanation
Social engineering exploits human psychology, not technical vulnerabilities.
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following is a sign that your computer may be infected with malware?
All of the above.
Programs open and close on their own.
Your computer runs slower than usual.
You receive unexpected pop-up ads.
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What is the primary goal of a denial-of-service (DoS) attack?
To install malware on a victim's device.
To disrupt the normal functioning of a targeted server.
To gain unauthorized access to a network.
To steal personal information.
Answer explanation
DoS attacks aim to overwhelm a target system, making it unavailable to legitimate users. The goal is disruption, not data theft or malware installation.
Similar Resources on Wayground
10 questions
CCP-101 Week 1 Quiz

Quiz
•
Professional Development
10 questions
Salesforce Developer Module 1 and 2

Quiz
•
Professional Development
7 questions
Restricted States - Uptraining Quiz (Speedy Sales)

Quiz
•
Professional Development
6 questions
GDPR and Cybersecurity Assessment

Quiz
•
University - Professi...
6 questions
Q05. E-MARKETING: PAY PER CLICK ADVERTISING

Quiz
•
University - Professi...
10 questions
4. Out of Office

Quiz
•
Professional Development
10 questions
Information Disclosure

Quiz
•
Professional Development
10 questions
Section 1 Quizz

Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade
Discover more resources for Other
11 questions
All about me

Quiz
•
Professional Development
10 questions
How to Email your Teacher

Quiz
•
Professional Development
15 questions
Fun Random Trivia

Quiz
•
Professional Development
22 questions
Anne Bradstreet 1612-1672

Quiz
•
Professional Development
18 questions
Spanish Speaking Countries and Capitals

Quiz
•
KG - Professional Dev...
14 questions
Fall Trivia

Quiz
•
11th Grade - Professi...
15 questions
Disney Characters Quiz

Quiz
•
Professional Development
15 questions
Quiz to Highlight Q types & other great features in Wayground

Quiz
•
Professional Development