How Cyber Safe Are You? Part 4

How Cyber Safe Are You? Part 4

Professional Development

10 Qs

quiz-placeholder

Similar activities

ECSD Gunadarma

ECSD Gunadarma

Professional Development

10 Qs

VNM CARE Refresher May 25

VNM CARE Refresher May 25

Professional Development

7 Qs

Ethical hacking Kali linux Part 1

Ethical hacking Kali linux Part 1

Professional Development

10 Qs

How Cyber Safe Are You? Part 3

How Cyber Safe Are You? Part 3

Professional Development

10 Qs

Concienciación en materia de Ciberseguridad - Mireia CETI

Concienciación en materia de Ciberseguridad - Mireia CETI

Professional Development

13 Qs

Questionnaire

Questionnaire

Professional Development

7 Qs

Outsmart the Social Engineer

Outsmart the Social Engineer

Professional Development

5 Qs

DIAGNÓSTICO TALLER CIBERSEGURIDAD

DIAGNÓSTICO TALLER CIBERSEGURIDAD

Professional Development

10 Qs

How Cyber Safe Are You? Part 4

How Cyber Safe Are You? Part 4

Assessment

Quiz

Information Technology (IT)

Professional Development

Easy

Created by

Crystal Eleanor

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a warning sign of a possible cybersecurity threat?

Getting an unexpected email that asks for your personal information or login details.

Frequently updating your antivirus software.

Sharing your passwords with trusted friends or family.

Reusing the same password across multiple accounts.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Priya receives a message on social media claiming she’s won a gift card and needs to click a link to claim it. The message comes from a friend’s account. She clicks the link and logs in using her email and password.

 

What should Priya have done instead?

Trusted the message since it came from a friend.

Ignored the message completely and deleted it.

Logged in quickly to not miss the reward.

Clicked the link and checked the URL later.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of phishing attacks?

To assist users in recovering lost files or data.

To steal personal data, financial information, or manipulate victims for financial or political gain.

To play harmless pranks on internet users.

To offer free helpful services to people online.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best way to protect yourself from phishing emails?

Avoid opening any emails at all.

Double-check the sender’s email address and avoid clicking on suspicious links.

Respond immediately to emails that seem urgent.

Turn off antivirus software to make email access faster.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the most important step to take if you fall for a phishing scam?

Trust it was just a one-time error and continue using your accounts as normal.

Unplug your computer to stop further activity.

Change any passwords that may have been compromised.

Ignore it unless your device starts acting strangely.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why do fake antivirus programs often show dozens of alarming virus “detections”?

They are more effective at cleaning your system.

They make users feel the software is doing its job.

They want you to contact tech support for help.

They try to scare you into paying for fake protection.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You receive an urgent email from your supervisor asking for names, addresses, and credit card details of the company’s top customers. Because it appears to be from your supervisor, you should send the information immediately.

True

False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?