How Cyber Safe Are You? Part 2

How Cyber Safe Are You? Part 2

Professional Development

10 Qs

quiz-placeholder

Similar activities

Day 02 - HTML Introduction

Day 02 - HTML Introduction

Professional Development

11 Qs

Streamlined Development Workflow & AI-Powered Efficiency 🎯

Streamlined Development Workflow & AI-Powered Efficiency 🎯

Professional Development

10 Qs

Microsoft 365

Microsoft 365

Professional Development

15 Qs

ATWIT meetup fun quiz

ATWIT meetup fun quiz

Professional Development

14 Qs

Panel Interview

Panel Interview

Professional Development

15 Qs

MIC Customs Solutions Quiz

MIC Customs Solutions Quiz

Professional Development

15 Qs

Mastering AI Safari For Everyday Use

Mastering AI Safari For Everyday Use

Professional Development

15 Qs

3MTT Quiz Wednesday( Rivers State Community)

3MTT Quiz Wednesday( Rivers State Community)

Professional Development

10 Qs

How Cyber Safe Are You? Part 2

How Cyber Safe Are You? Part 2

Assessment

Quiz

Information Technology (IT)

Professional Development

Medium

Created by

Crystal Eleanor

Used 2+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you do if you are unsure whether a link in an email is safe to click?

Just click it anyway and see what happens.

Trust your gut and open the link to check.

Hover your mouse over the link to preview where it leads before clicking.

Send the link to a friend or coworker to see what they think.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In cybersecurity, what is the main function of a firewall?

Scans your system and eliminates viruses.

Blocks unauthorized access to or from a private network.

Encrypts sensitive data while it's being sent.

Monitors and records a user's online behaviour.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you do first if you think your computer might be infected with malware?

Disconnect from the internet and hope the issue resolves on its own.

Quickly install more antivirus software without checking the source.

Use trusted antivirus software or contact a cybersecurity expert to scan and remove the malware.

Post about the issue on social media to see if anyone can help.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a social engineering attack?

Installing antivirus software to protect your device.

Pretending to be IT support to trick someone into giving up their password.

Configuring a firewall to secure a network.

Performing regular updates to keep software secure.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Tom gets a call from someone claiming to be from the IT department. They say there’s a problem with his account and ask for his login details to “fix it remotely.” The caller sounds professional and even knows his name and job title.

 

What should Tom do?

Give his login info to resolve the issue quickly.

Hang up and report the incident to the real IT department.

Ask for their name and call them back later.

Share only his username, not his password.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Jake connects to free Wi-Fi at a mall. Before gaining access, he’s redirected to a login page asking for his email and password. He fills it out. Later, he finds out someone tried logging into his social media accounts.

 

What kind of attack did Jake fall for?

Phishing via a fake login page on a public network.

Password reset attack.

Adware infection from an app.

SIM card cloning.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When are phishing attacks most likely to increase in frequency?

During festive or holiday seasons.

Late at night or during midnight hours.

Only on weekends.

Early in the morning, around breakfast time.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?