
Cyber Quiz level 3
Authored by Sadhana Sitaram
Computers
University
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 15 pts
A major healthcare company recently suffered a cyberattack where attackers stole sensitive personal and medical data of over 30 million customers, then used social media platforms to threaten company executives for alleged grievances. What is the MOST critical cybersecurity lesson from this incident?
Answer explanation
Healthcare breaches often expose sensitive personal and medical data which attackers can exploit for social engineering, intimidation, or extortion—extending the threat beyond data theft to reputational and operational damage.
2.
MULTIPLE CHOICE QUESTION
1 min • 15 pts
An organization wants to enhance remote access security without using VPNs. Which strategy offers the MOST robust protection?
Answer explanation
Device authentication with role-based permissions ensures only authorized devices and users access resources—core to Zero Trust principles and safer than passwords alone.
3.
MULTIPLE CHOICE QUESTION
1 min • 15 pts
Which action MOST effectively strengthens account protection against phishing-based compromises?
Answer explanation
Authenticator apps offer stronger 2FA security than SMS, which can be intercepted or SIM-swapped—greatly reducing phishing success rates.
4.
MULTIPLE CHOICE QUESTION
1 min • 15 pts
You receive a pop-up on your computer claiming your software is out-of-date and urging immediate installation. What is the safest action?
Answer explanation
Fake update pop-ups often deliver malware; always verify updates manually from official software sources.
5.
MULTIPLE CHOICE QUESTION
1 min • 15 pts
Multiple user accounts show frequent login failures from different locations. Which is the LEAST likely reason?
Answer explanation
Repeated login failures across locations usually indicate attacks, not simple forgetfulness; brute-force or credential stuffing are more probable.
6.
MULTIPLE CHOICE QUESTION
1 min • 15 pts
A critical business application reports multiple unpatched vulnerabilities. Which action increases risk the MOST?
Answer explanation
Delaying patches leaves known vulnerabilities exposed, creating a window for exploitation—timely updates are crucial.
7.
MULTIPLE CHOICE QUESTION
1 min • 15 pts
During a cyber incident drill, which is the MOST important FIRST step after detecting malware?
Answer explanation
Isolation stops the malware from spreading and limits damage before any cleanup or analysis begins.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?