How Cyber Safe Are You? Part 3

How Cyber Safe Are You? Part 3

Professional Development

10 Qs

quiz-placeholder

Similar activities

1.8 Quiz on Power Platform and Microsoft Teams

1.8 Quiz on Power Platform and Microsoft Teams

Professional Development

14 Qs

OXORD Quiz on Online Orientation

OXORD Quiz on Online Orientation

Professional Development

11 Qs

DEAM (Quiz 1)

DEAM (Quiz 1)

Professional Development

11 Qs

How Cyber Safe Are You? Part 2

How Cyber Safe Are You? Part 2

Professional Development

10 Qs

EarleandWilson_TC_223052025

EarleandWilson_TC_223052025

Professional Development

11 Qs

QUIZ IT HSSE MONTHLY MEETING - EDISI KEMERDEKAAN

QUIZ IT HSSE MONTHLY MEETING - EDISI KEMERDEKAAN

Professional Development

11 Qs

OPTIK SMP 2024 REDTOP JAKARTA

OPTIK SMP 2024 REDTOP JAKARTA

Professional Development

10 Qs

Treino Pré Teste Avaliação 1 - PBE1

Treino Pré Teste Avaliação 1 - PBE1

Professional Development

10 Qs

How Cyber Safe Are You? Part 3

How Cyber Safe Are You? Part 3

Assessment

Quiz

Information Technology (IT)

Professional Development

Easy

Created by

Crystal Eleanor

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is it important to be cautious about phishing emails?

To keep yourself safe and secure online.

To protect your personal information and identity.

To avoid falling for scams or being tricked.

All of the answers.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common red flag that may indicate a phishing email?

The message comes from a familiar and trusted contact.

The email starts with a generic greeting.

The email asks for confidential or sensitive information.

The sender marks the email as “important”.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Emma receives an email that says she’s won a RM100 gift card. To claim it, she must click a link and enter her work email login. The email looks like it's from a well-known store and even uses the company logo.

 

What should Emma do?

Click the link and enter her details to claim the prize.

Forward the email to her friends to let them win too.

Report the email as phishing and delete it.

Respond to the sender asking for more info.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which action is the best way to protect yourself from social engineering scams?

Avoid responding to messages that seem suspicious.

Sharing personal details only with people you trust.

Clicking on links in emails from unknown senders.

Entering your password when asked by unfamiliar websites.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Jake uses the same password “Jake123!” for his email, social media, and multiple work accounts. One day, his social media gets hacked, and soon after, his work email is also compromised.

 

What mistake did Jake make that increased his risk?

He used a password with numbers and a symbol.

He did not update his browser regularly.

He reused the same password across multiple accounts.

He turned on two-factor authentication.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Emily posts a birthday countdown and shares a “fun facts about me” quiz on social media, revealing her pet’s name, favourite colour, and the name of her elementary school.

 

What risk is Emily exposing herself to?

Making her profile more engaging to friends.

Sharing useful information for security questions hackers might use.

Helping marketers personalize ads.

Risking physical theft of her identity documents.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one is a legitimate URL?

http://www.bnrn.gov.my/

https://facebok.com/

https://sarawak.gov.my/

https://mybayarrmpgov.my/

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?