Search Header Logo

GenElec1 Cybersecurity

Authored by momoted momoted

Information Technology (IT)

University

Used 2+ times

GenElec1 Cybersecurity
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are Man-In-The-Middle attacks?

When someone steals your physical phone

When two people chat in secret

When a hacker intercepts communication between two parties

When your friend borrows your laptop

Answer explanation

A MITM attack happens when a hacker secretly monitors or alters data between two communicating parties without them knowing.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What’s the safest action if you receive a suspicious email?

Click the link to see what it is

Delete it or mark as spam

Reply to ask for more details

Screenshot it and post online

Answer explanation

Clicking or replying to suspicious emails could expose you to phishing or malware. Marking it as spam helps your email filter learn and block similar messages.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What makes spam dangerous?

It’s annoying and wastes your time

It can slow down your internet

It might contain malware or phishing links

It helps you discover cool offers

Answer explanation

Spam isn't just annoying—some messages try to trick users into downloading malware or entering personal information on fake websites.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Where are you most likely to be a victim of WiFi eavesdropping?

At home with a password-protected WiFi

On free, unsecured public WiFi

When using mobile data

In airplane mode

Answer explanation

Public WiFi often lacks encryption, allowing hackers on the same network to intercept your data.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What’s a good way to create a strong password?

Use your birth month and birth year

Use words found in a dictionary

Mix uppercase, lowercase, symbols, and numbers

Name of your pet only

Answer explanation

A strong password combines varied character types and length, making it harder to guess or brute-force.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Turning off your Bluetooth when not in use can improve your online security.

True

False

Answer explanation

Bluetooth vulnerabilities have allowed silent hacks. Keeping it off limits exposure when not needed.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A good password should include your birthday and full name.

True

False

Answer explanation

Personal details are easy for hackers to guess or find online, making them weak password choices.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?