Cybersecurity 101

Cybersecurity 101

Professional Development

11 Qs

quiz-placeholder

Similar activities

Phishing

Phishing

Professional Development

16 Qs

Questionnaire

Questionnaire

Professional Development

7 Qs

DT IT Security Awareness Quiz

DT IT Security Awareness Quiz

Professional Development

16 Qs

Sosialisasi Keamanan Informasi 2024

Sosialisasi Keamanan Informasi 2024

Professional Development

10 Qs

Cybersecurity 101

Cybersecurity 101

Assessment

Quiz

Information Technology (IT)

Professional Development

Hard

Created by

Jn Agu

Used 1+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

practice of maintaining and following a set of regular habits and best practices to keep your digital environment secure, healthy, and free from Cyber Threats.

Cybersecurity

Data Security

Cyber Hygiene

Information Security

2.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

An attacker intercepts and alters communication between two parties.

Man-in-the-Middle Attack

Vishing

Denial of Service Attack

Impersonation

3.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

attacker sends a fake SMS message with a malicious link or phone number designed to steal personal data.

Phishing

Spear Phishing

Whaling

Smishing

4.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Individuals with wide range of skills who are motivated by religious or political beliefs

Cyber Terrorists

Hacktivist

Hacker Teams

Industrial Spies

5.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Individuals who use their professed hacking skills for defensive purposes.

Hacktivist

Black Hat

Gray Hat

White Hat

6.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Cyberattack technique that manipulates people into revealing confidential information, clicking on malicious links, or performing actions that compromise security. Instead of hacking systems directly, attackers exploit human psychology to bypass security controls.

Impersonation

Social Engineering

Baiting

Phishing Attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

An attacker pretends to be someone else—like a colleague, boss, or authority figure—in order to manipulate others into performing actions, such as transferring funds or providing confidential information.

Pretexting

Impersonation

Baiting

Vishing

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?