Search Header Logo

How Cyber Safe Are You? Part 2

Authored by Crystal Eleanor

Information Technology (IT)

Professional Development

Used 2+ times

How Cyber Safe Are You? Part 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you do if you are unsure whether a link in an email is safe to click?

Just click it anyway and see what happens.

Trust your gut and open the link to check.

Hover your mouse over the link to preview where it leads before clicking.

Send the link to a friend or coworker to see what they think.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In cybersecurity, what is the main function of a firewall?

Scans your system and eliminates viruses.

Blocks unauthorized access to or from a private network.

Encrypts sensitive data while it's being sent.

Monitors and records a user's online behaviour.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you do first if you think your computer might be infected with malware?

Disconnect from the internet and hope the issue resolves on its own.

Quickly install more antivirus software without checking the source.

Use trusted antivirus software or contact a cybersecurity expert to scan and remove the malware.

Post about the issue on social media to see if anyone can help.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a social engineering attack?

Installing antivirus software to protect your device.

Pretending to be IT support to trick someone into giving up their password.

Configuring a firewall to secure a network.

Performing regular updates to keep software secure.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Tom gets a call from someone claiming to be from the IT department. They say there’s a problem with his account and ask for his login details to “fix it remotely.” The caller sounds professional and even knows his name and job title.

 

What should Tom do?

Give his login info to resolve the issue quickly.

Hang up and report the incident to the real IT department.

Ask for their name and call them back later.

Share only his username, not his password.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Jake connects to free Wi-Fi at a mall. Before gaining access, he’s redirected to a login page asking for his email and password. He fills it out. Later, he finds out someone tried logging into his social media accounts.

 

What kind of attack did Jake fall for?

Phishing via a fake login page on a public network.

Password reset attack.

Adware infection from an app.

SIM card cloning.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When are phishing attacks most likely to increase in frequency?

During festive or holiday seasons.

Late at night or during midnight hours.

Only on weekends.

Early in the morning, around breakfast time.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?