How Cyber Safe Are You? Part 3

How Cyber Safe Are You? Part 3

Professional Development

10 Qs

quiz-placeholder

Similar activities

CloudRaya Webinar IaC Quiz

CloudRaya Webinar IaC Quiz

Professional Development

10 Qs

OXORD Quiz on Online Orientation

OXORD Quiz on Online Orientation

Professional Development

11 Qs

Практическое применение ИИ тест 5

Практическое применение ИИ тест 5

Professional Development

11 Qs

Data Analysis and Visualization

Data Analysis and Visualization

Professional Development

15 Qs

NFCM Tech Night Quiz

NFCM Tech Night Quiz

Professional Development

13 Qs

GO2 & FE21! Javascript Fundamental

GO2 & FE21! Javascript Fundamental

Professional Development

10 Qs

DEAM (Quiz 1)

DEAM (Quiz 1)

Professional Development

11 Qs

Sprint Planning Quiz

Sprint Planning Quiz

Professional Development

10 Qs

How Cyber Safe Are You? Part 3

How Cyber Safe Are You? Part 3

Assessment

Quiz

Information Technology (IT)

Professional Development

Practice Problem

Easy

Created by

Crystal Eleanor

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is it important to be cautious about phishing emails?

To keep yourself safe and secure online.

To protect your personal information and identity.

To avoid falling for scams or being tricked.

All of the answers.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common red flag that may indicate a phishing email?

The message comes from a familiar and trusted contact.

The email starts with a generic greeting.

The email asks for confidential or sensitive information.

The sender marks the email as “important”.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Emma receives an email that says she’s won a RM100 gift card. To claim it, she must click a link and enter her work email login. The email looks like it's from a well-known store and even uses the company logo.

 

What should Emma do?

Click the link and enter her details to claim the prize.

Forward the email to her friends to let them win too.

Report the email as phishing and delete it.

Respond to the sender asking for more info.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which action is the best way to protect yourself from social engineering scams?

Avoid responding to messages that seem suspicious.

Sharing personal details only with people you trust.

Clicking on links in emails from unknown senders.

Entering your password when asked by unfamiliar websites.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Jake uses the same password “Jake123!” for his email, social media, and multiple work accounts. One day, his social media gets hacked, and soon after, his work email is also compromised.

 

What mistake did Jake make that increased his risk?

He used a password with numbers and a symbol.

He did not update his browser regularly.

He reused the same password across multiple accounts.

He turned on two-factor authentication.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Emily posts a birthday countdown and shares a “fun facts about me” quiz on social media, revealing her pet’s name, favourite colour, and the name of her elementary school.

 

What risk is Emily exposing herself to?

Making her profile more engaging to friends.

Sharing useful information for security questions hackers might use.

Helping marketers personalize ads.

Risking physical theft of her identity documents.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one is a legitimate URL?

http://www.bnrn.gov.my/

https://facebok.com/

https://sarawak.gov.my/

https://mybayarrmpgov.my/

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Information Technology (IT)