Cyber Quiz level 3

Cyber Quiz level 3

University

15 Qs

quiz-placeholder

Similar activities

Hệ Điều Hành Của Máy Tính

Hệ Điều Hành Của Máy Tính

10th Grade - University

10 Qs

C++ Array Quiz

C++ Array Quiz

University

10 Qs

Mid Test Perancangan&Konstruksi PL

Mid Test Perancangan&Konstruksi PL

University

20 Qs

Information System and Modern Organization part 1

Information System and Modern Organization part 1

University

14 Qs

MESYUARAT KE-3 MYTECC ASSEMBLY: TOGETHER WE BIND

MESYUARAT KE-3 MYTECC ASSEMBLY: TOGETHER WE BIND

University

20 Qs

Software Testing

Software Testing

University

10 Qs

Chapter 2: Input Device

Chapter 2: Input Device

12th Grade - University

12 Qs

C Programming Unit-1 Test-2

C Programming Unit-1 Test-2

University

20 Qs

Cyber Quiz level 3

Cyber Quiz level 3

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

Sadhana Sitaram

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 15 pts

A major healthcare company recently suffered a cyberattack where attackers stole sensitive personal and medical data of over 30 million customers, then used social media platforms to threaten company executives for alleged grievances. What is the MOST critical cybersecurity lesson from this incident?

Cybersecurity breaches can lead to not only data theft but also targeted intimidation and extortion tactics.
Data breaches only affect company finances and rarely involve personal data exposure.
Physical security is more important than digital security in preventing cyberattacks.
Cyber attackers mainly target small companies, so large companies are usually safe.

Answer explanation

Healthcare breaches often expose sensitive personal and medical data which attackers can exploit for social engineering, intimidation, or extortion—extending the threat beyond data theft to reputational and operational damage.

2.

MULTIPLE CHOICE QUESTION

1 min • 15 pts

An organization wants to enhance remote access security without using VPNs. Which strategy offers the MOST robust protection?

Restricting access through device authentication and role-based permissions
Allowing employees to access from any device for flexibility
Sharing administrator credentials among senior staff
Relying on strong passwords alone without additional controls

Answer explanation

Device authentication with role-based permissions ensures only authorized devices and users access resources—core to Zero Trust principles and safer than passwords alone.

3.

MULTIPLE CHOICE QUESTION

1 min • 15 pts

Which action MOST effectively strengthens account protection against phishing-based compromises?

Using a long and complex password but the same one across trusted accounts
Allowing browsers or password managers to autofill saved credentials on login pages
Frequently changing your password every few months without 2FA
Enabling two-factor authentication through an authenticator app rather than SMS

Answer explanation

Authenticator apps offer stronger 2FA security than SMS, which can be intercepted or SIM-swapped—greatly reducing phishing success rates.

4.

MULTIPLE CHOICE QUESTION

1 min • 15 pts

You receive a pop-up on your computer claiming your software is out-of-date and urging immediate installation. What is the safest action?

Click the update immediately to avoid security risks
Ignore the pop-up and continue working
Close the pop-up and manually check for updates from the official software site
Restart the computer and try again

Answer explanation

Fake update pop-ups often deliver malware; always verify updates manually from official software sources.

5.

MULTIPLE CHOICE QUESTION

1 min • 15 pts

Multiple user accounts show frequent login failures from different locations. Which is the LEAST likely reason?

Automated brute-force attempt
Users forgot passwords
Credential stuffing attack
Misconfigured identity provider

Answer explanation

Repeated login failures across locations usually indicate attacks, not simple forgetfulness; brute-force or credential stuffing are more probable.

6.

MULTIPLE CHOICE QUESTION

1 min • 15 pts

A critical business application reports multiple unpatched vulnerabilities. Which action increases risk the MOST?

Monitoring for active exploits without patching
Applying only urgent patches
Performing updates during off-hours
Delaying updates to avoid downtime

Answer explanation

Delaying patches leaves known vulnerabilities exposed, creating a window for exploitation—timely updates are crucial.

7.

MULTIPLE CHOICE QUESTION

1 min • 15 pts

During a cyber incident drill, which is the MOST important FIRST step after detecting malware?

Notify media
Run antivirus on all devices
Isolate impacted systems
Begin forensic analysis

Answer explanation

Isolation stops the malware from spreading and limits damage before any cleanup or analysis begins.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers