How Cyber Safe Are You? Part 2

How Cyber Safe Are You? Part 2

Professional Development

10 Qs

quiz-placeholder

Similar activities

TIK KELAS 4

TIK KELAS 4

Professional Development

11 Qs

Cyber Ethics and Intellectual Property Quiz

Cyber Ethics and Intellectual Property Quiz

Professional Development

12 Qs

Ruang Murid

Ruang Murid

Professional Development

10 Qs

Network Security and Protocols Quiz

Network Security and Protocols Quiz

Professional Development

15 Qs

Integrating Video Lectures for KS 1 & 2

Integrating Video Lectures for KS 1 & 2

Professional Development

10 Qs

Phishing Awareness Quiz

Phishing Awareness Quiz

Professional Development

10 Qs

Lesson01 Quiz

Lesson01 Quiz

Professional Development

11 Qs

Post Test - Good Project Management for Aggressive Organization

Post Test - Good Project Management for Aggressive Organization

Professional Development

10 Qs

How Cyber Safe Are You? Part 2

How Cyber Safe Are You? Part 2

Assessment

Quiz

Information Technology (IT)

Professional Development

Practice Problem

Medium

Created by

Crystal Eleanor

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you do if you are unsure whether a link in an email is safe to click?

Just click it anyway and see what happens.

Trust your gut and open the link to check.

Hover your mouse over the link to preview where it leads before clicking.

Send the link to a friend or coworker to see what they think.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In cybersecurity, what is the main function of a firewall?

Scans your system and eliminates viruses.

Blocks unauthorized access to or from a private network.

Encrypts sensitive data while it's being sent.

Monitors and records a user's online behaviour.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you do first if you think your computer might be infected with malware?

Disconnect from the internet and hope the issue resolves on its own.

Quickly install more antivirus software without checking the source.

Use trusted antivirus software or contact a cybersecurity expert to scan and remove the malware.

Post about the issue on social media to see if anyone can help.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a social engineering attack?

Installing antivirus software to protect your device.

Pretending to be IT support to trick someone into giving up their password.

Configuring a firewall to secure a network.

Performing regular updates to keep software secure.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Tom gets a call from someone claiming to be from the IT department. They say there’s a problem with his account and ask for his login details to “fix it remotely.” The caller sounds professional and even knows his name and job title.

 

What should Tom do?

Give his login info to resolve the issue quickly.

Hang up and report the incident to the real IT department.

Ask for their name and call them back later.

Share only his username, not his password.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Jake connects to free Wi-Fi at a mall. Before gaining access, he’s redirected to a login page asking for his email and password. He fills it out. Later, he finds out someone tried logging into his social media accounts.

 

What kind of attack did Jake fall for?

Phishing via a fake login page on a public network.

Password reset attack.

Adware infection from an app.

SIM card cloning.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When are phishing attacks most likely to increase in frequency?

During festive or holiday seasons.

Late at night or during midnight hours.

Only on weekends.

Early in the morning, around breakfast time.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?