Search Header Logo

CyberSmarts: 10-Minute Cybersecurity Challenge

Authored by Chantal Corbin

Information Technology (IT)

Professional Development

Used 6+ times

CyberSmarts: 10-Minute Cybersecurity Challenge
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

What’s considered the strongest password?

Your pet’s name and birth year

Password123

A 16-character mix of letters, numbers, and symbols

Your favorite sports team

Answer explanation

A 16-character mix of letters, numbers, and symbols is considered the strongest password because it combines complexity and length, making it harder to guess or crack compared to simple or common passwords.

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

How often should you change important passwords (like email or finance)?

Every Month

Every 180 days or when compromised

Once a year

Never

Answer explanation

Changing important passwords every 180 days or when compromised helps protect against unauthorized access. Regular updates reduce the risk of breaches, while 'never' or infrequent changes can leave accounts vulnerable.

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

Which of these should never be used for multi-factor authentication?

Authenticator app

Email link

Text message

Fingerprint

Answer explanation

Email links can be intercepted or spoofed, making them less secure for multi-factor authentication. In contrast, authenticator apps, text messages, and fingerprints provide stronger security measures.

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

If you suspect your password has been stolen, what should you do first?

Wait and see what happens

Delete your account

Change it immediately and report to IT

Post about it online

Answer explanation

If you suspect your password has been stolen, the first step is to change it immediately to prevent unauthorized access. Reporting to IT ensures they can take further action to secure your account.

5.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Media Image

Adversaries made the websites look very real, can you spot the real one?

Media Image
Media Image

6.

MULTIPLE CHOICE QUESTION

20 sec • 2 pts

Media Image

How many indicators on the fake webpage were you able to find?

1

2

3

4

5

Answer explanation

You were able to find 3 indicators on the fake webpage, which is the correct answer. This indicates that there were multiple signs of the webpage being fake, confirming the choice of 3.

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

Before posting a school event photo, what should you check?

Nothing - just Post

The lighting and filter

That your friends have seen it

If students are identifiable and media releases are approved

Answer explanation

Before posting a school event photo, it's crucial to check if students are identifiable and that media releases are approved. This ensures privacy and compliance with school policies.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Information Technology (IT)