Cybersecurity Quiz

Cybersecurity Quiz

University

30 Qs

quiz-placeholder

Similar activities

Python Module 1

Python Module 1

University

25 Qs

PYTHON CONTEST

PYTHON CONTEST

University

25 Qs

Computer Classification

Computer Classification

University

34 Qs

NETZKNOTEN (Web Designing)

NETZKNOTEN (Web Designing)

University

25 Qs

BSEMC2A LABORATORY INFO MANAGEMENT

BSEMC2A LABORATORY INFO MANAGEMENT

University

25 Qs

QUIZZ TIC et logiciels métiers

QUIZZ TIC et logiciels métiers

University

25 Qs

TENTENTENTENENEN

TENTENTENTENENEN

University

25 Qs

Quiz di Programmazione

Quiz di Programmazione

2nd Grade - University

25 Qs

Cybersecurity Quiz

Cybersecurity Quiz

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Patrick Flowers

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following are ways that an 'identity thief' can obtain someone's credit card numbers and other pieces of identification?

Shoulder surfing at ATM machines
All of these
"Dumpster Diving" from a trash can
Stealing mail from mailboxes

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Let's say you have a credit card which has no balance due on it. You've decided not to use it anymore. No monthly statements show up for it and you don't carry it with you. There is no way an 'identity thief' can get this card's number. True or False?

True
False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which is an act of identity theft?

Receiving permission to use a parents’ credit card for school clothes
Wrongfully acquiring and using someone’s personal identification
Taking the identity of another individual as inspiration for a costume
Having the same name as another person

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

An intentional effort to deceive another individual for personal gain

Mean people
Fake
Fraud
Crime

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Software that is installed on a computing device to prevent viruses from infecting the device.

Antivirus
Firewall
Phishing
Spyware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common tactic used in phishing scams?

Sending personalized emails with legitimate-looking logos and links

Providing free giveaways without any prior interaction

Displaying pop-up ads with flashing colors and loud sounds

Offering unrealistic investment opportunities

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can someone avoid falling victim to a scam?

Click on suspicious links and attachments; provide personal information when asked; use weak passwords.

Ignore suspicious emails and links; visit any website without verifying its legitimacy; use the same password for all accounts.

Open emails from unknown senders; click on any link or attachment; use simple and easily guessable passwords.

Be cautious of suspicious emails, links, and attachments; verify website legitimacy; use strong passwords.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?