
GenElec1 Cybersecurity
Authored by momoted momoted
Information Technology (IT)
University
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are Man-In-The-Middle attacks?
When someone steals your physical phone
When two people chat in secret
When a hacker intercepts communication between two parties
When your friend borrows your laptop
Answer explanation
A MITM attack happens when a hacker secretly monitors or alters data between two communicating parties without them knowing.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What’s the safest action if you receive a suspicious email?
Click the link to see what it is
Delete it or mark as spam
Reply to ask for more details
Screenshot it and post online
Answer explanation
Clicking or replying to suspicious emails could expose you to phishing or malware. Marking it as spam helps your email filter learn and block similar messages.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What makes spam dangerous?
It’s annoying and wastes your time
It can slow down your internet
It might contain malware or phishing links
It helps you discover cool offers
Answer explanation
Spam isn't just annoying—some messages try to trick users into downloading malware or entering personal information on fake websites.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Where are you most likely to be a victim of WiFi eavesdropping?
At home with a password-protected WiFi
On free, unsecured public WiFi
When using mobile data
In airplane mode
Answer explanation
Public WiFi often lacks encryption, allowing hackers on the same network to intercept your data.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What’s a good way to create a strong password?
Use your birth month and birth year
Use words found in a dictionary
Mix uppercase, lowercase, symbols, and numbers
Name of your pet only
Answer explanation
A strong password combines varied character types and length, making it harder to guess or brute-force.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Turning off your Bluetooth when not in use can improve your online security.
True
False
Answer explanation
Bluetooth vulnerabilities have allowed silent hacks. Keeping it off limits exposure when not needed.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A good password should include your birthday and full name.
True
False
Answer explanation
Personal details are easy for hackers to guess or find online, making them weak password choices.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?