Understanding Cybersecurity's Human Element

Understanding Cybersecurity's Human Element

Professional Development

20 Qs

quiz-placeholder

Similar activities

Cyber Security Awareness

Cyber Security Awareness

Professional Development

20 Qs

Microsoft IT Pro Meetup - July

Microsoft IT Pro Meetup - July

Professional Development

15 Qs

Cyber Security livello 2

Cyber Security livello 2

Professional Development

20 Qs

Mitre Att&ck Quiz

Mitre Att&ck Quiz

Professional Development

15 Qs

DIAGNOSTICO CIBERSEGURIDAD

DIAGNOSTICO CIBERSEGURIDAD

Professional Development

15 Qs

CSF-PT05Q1

CSF-PT05Q1

Professional Development

15 Qs

Cybersecurity Scenarios and Tools Quiz

Cybersecurity Scenarios and Tools Quiz

Professional Development

21 Qs

CyberSecurity Training-Quiz

CyberSecurity Training-Quiz

Professional Development

19 Qs

Understanding Cybersecurity's Human Element

Understanding Cybersecurity's Human Element

Assessment

Quiz

Information Technology (IT)

Professional Development

Easy

Created by

Caroline Dukes

Used 1+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common tactic used in social engineering attacks?

Encrypting data

Impersonating a trusted source

Installing antivirus software

Using complex passwords

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a key component of phishing awareness training?

Learning to code

Recognising suspicious emails

Installing hardware

Writing reports

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an insider threat in cybersecurity?

A virus from the internet

A threat from within the organisation

A hacker from another country

A malfunctioning computer

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a best practice for password security?

Using the same password for all accounts

Sharing passwords with colleagues

Using a mix of letters, numbers, and symbols

Writing passwords on a sticky note

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a basic cyber hygiene practice?

Ignoring software updates

Regularly updating software

Disabling firewalls

Using public Wi-Fi for sensitive transactions

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a phishing attack?

A legitimate email from your bank

An email asking for your password to verify your account

A phone call from a friend

A text message from your mobile provider

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you do if you suspect an insider threat?

Ignore it

Report it to your security team

Confront the person directly

Delete all your files

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?