Search Header Logo

How Cyber Safe Are You? Part 3

Authored by Crystal Eleanor

Information Technology (IT)

Professional Development

Used 1+ times

How Cyber Safe Are You? Part 3
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is it important to be cautious about phishing emails?

To keep yourself safe and secure online.

To protect your personal information and identity.

To avoid falling for scams or being tricked.

All of the answers.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common red flag that may indicate a phishing email?

The message comes from a familiar and trusted contact.

The email starts with a generic greeting.

The email asks for confidential or sensitive information.

The sender marks the email as “important”.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Emma receives an email that says she’s won a RM100 gift card. To claim it, she must click a link and enter her work email login. The email looks like it's from a well-known store and even uses the company logo.

 

What should Emma do?

Click the link and enter her details to claim the prize.

Forward the email to her friends to let them win too.

Report the email as phishing and delete it.

Respond to the sender asking for more info.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which action is the best way to protect yourself from social engineering scams?

Avoid responding to messages that seem suspicious.

Sharing personal details only with people you trust.

Clicking on links in emails from unknown senders.

Entering your password when asked by unfamiliar websites.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Jake uses the same password “Jake123!” for his email, social media, and multiple work accounts. One day, his social media gets hacked, and soon after, his work email is also compromised.

 

What mistake did Jake make that increased his risk?

He used a password with numbers and a symbol.

He did not update his browser regularly.

He reused the same password across multiple accounts.

He turned on two-factor authentication.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Emily posts a birthday countdown and shares a “fun facts about me” quiz on social media, revealing her pet’s name, favourite colour, and the name of her elementary school.

 

What risk is Emily exposing herself to?

Making her profile more engaging to friends.

Sharing useful information for security questions hackers might use.

Helping marketers personalize ads.

Risking physical theft of her identity documents.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one is a legitimate URL?

http://www.bnrn.gov.my/

https://facebok.com/

https://sarawak.gov.my/

https://mybayarrmpgov.my/

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?