Understanding Cybersecurity's Human Element

Understanding Cybersecurity's Human Element

Professional Development

20 Qs

quiz-placeholder

Similar activities

Interns'25 quiz Infosec

Interns'25 quiz Infosec

Professional Development

20 Qs

CSF-PT05Q1

CSF-PT05Q1

Professional Development

15 Qs

CyberSecurity Training-Quiz

CyberSecurity Training-Quiz

Professional Development

19 Qs

Cybersecurity Core Functions

Cybersecurity Core Functions

Professional Development

15 Qs

Cyber Security livello 2

Cyber Security livello 2

Professional Development

20 Qs

DIAGNOSTICO CIBERSEGURIDAD

DIAGNOSTICO CIBERSEGURIDAD

Professional Development

15 Qs

Cybersecurity Test

Cybersecurity Test

Professional Development

20 Qs

Social Engineering Cydex

Social Engineering Cydex

Professional Development

23 Qs

Understanding Cybersecurity's Human Element

Understanding Cybersecurity's Human Element

Assessment

Quiz

Information Technology (IT)

Professional Development

Easy

Created by

Caroline Dukes

Used 1+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common tactic used in social engineering attacks?

Encrypting data

Impersonating a trusted source

Installing antivirus software

Using complex passwords

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a key component of phishing awareness training?

Learning to code

Recognising suspicious emails

Installing hardware

Writing reports

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an insider threat in cybersecurity?

A virus from the internet

A threat from within the organisation

A hacker from another country

A malfunctioning computer

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a best practice for password security?

Using the same password for all accounts

Sharing passwords with colleagues

Using a mix of letters, numbers, and symbols

Writing passwords on a sticky note

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a basic cyber hygiene practice?

Ignoring software updates

Regularly updating software

Disabling firewalls

Using public Wi-Fi for sensitive transactions

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a phishing attack?

A legitimate email from your bank

An email asking for your password to verify your account

A phone call from a friend

A text message from your mobile provider

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you do if you suspect an insider threat?

Ignore it

Report it to your security team

Confront the person directly

Delete all your files

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?