Search Header Logo

Cyber Safety Scavenger Hunt

Authored by Tint Htoo

Other

University

Cyber Safety Scavenger Hunt
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of cyberattack is characterised by a trial-and-error method using automated software to decode login information and encryption keys to gain unauthorised access to systems?

Advanced Persistent Threat

Distributed Denial-of-Service

Brute force attack

Phishing attack

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is/are potential consequence(s) of oversharing of personal information online?

Becoming a victim of identity theft

Falling prey to targeted phishing attacks

Compromising privacy through geotagging

All of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following statements is false?

Geotagging can expose your location and daily activities to cybercriminals who may use the information for malicious purposes

Internet of Things are computer systems that deliver essential services such as water and transportation

Smart refrigerators and smart watches are examples of Internet of Things

Increased connectivity helps to improve our lives but also put us at risk of more cyber threats

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following statements is true about using your personal information?

Cyberattacks can cause devastating impact to essential services such as disruption to online healthcare systems

Phishing scams only target large corporations and not individual users

Public Wi-Fi networks are always safe and secure for conducting sensitive transactions

Paying ransom always provide a guarantee that your files will be decrypted

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following actions does not help us create a strong passphrase?

Using a mixture of lowercase and uppercase letters

Using numbers and/or symbols

Using five different words that relate to a memory so that it is easy to remember

Using personal information such as name and birthdate

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Two-Factor Authentication (2FA) is an additional layer of security for online accounts on top of your password. Which of the following is not an example of 2FA?

Facial recognition

Fingerprint recognition

Phone number

One-Time Password

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not a sign of a phishing message?

The message asks you to fill in your personal details for attractive rewards

The sender’s contact and profile picture look mismatched or misleading

The message is from gov.sg reminding you that you have an unread message in your Singpass app

The message contains a suspicious link

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?