Search Header Logo

Cybersecurity Awareneness

Authored by Fritzi Lescano

Other

Professional Development

Used 1+ times

Cybersecurity Awareneness
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

Read the email and determine whether it is genuine or phishing attempt.

Yes, it is a genuine email

No, it is a phishing email

Answer explanation

Media Image

The email's sender is NOT related to your organization. The hyperlink included in the message shows a site that does not belong to your organization. These two clues indicate that this is a phishing attempt.

If you follow the instructions given and fill out the form, you will be disclosing information, such as your user ID and password, to a cybercriminal.

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

Read the email and determine whether it is genuine or phishing attempt.

Yes, it is a genuine email

No, it is a phishing email

Answer explanation

Media Image

The salutation is generic. A government revenue agency would never provide specific information, such as a refund amount, in an email.

In addition, the domain name in the URL at the bottom of the message is different than the sender's name, and no additional contact information was provided.

You cannot tell where the "click here" link will take you, unless you hover over the link with your mouse.

Also, lookout for spelling errors.

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

TRUE or FALSE: Attachments should always be treated with caution, even if you know the sender.

True

False

Answer explanation

Attachments should be treated with caution—even from known senders—because accounts can be hacked and files may contain malware. Always verify unexpected attachments before opening.

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A small business discovers that all of its customer files have been encrypted and a note on the screen demands payment in cryptocurrency to restore access.

What type of cybercrime is this?

Ransomware attack

Password spraying

Social media impersonation

Insider data theft

Answer explanation

This option describes malicious software that encrypts data and demands payment to provide the decryption key, matching the scenario.

In a ransomware attack, criminals typically spread malware via email attachments, compromised websites, or vulnerable remote access tools. Once executed, the malware silently encrypts files across the system or network and then displays a ransom note, usually demanding payment in cryptocurrency because it is harder to trace. The victims may face downtime, data loss, and reputational damage.

Good defenses include regular offline backups, patching systems, using endpoint protection, and training staff not to open suspicious attachments or links.


5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Employee Awareness & Defense: What should you do if you suspect an email might be a phishing attempt?

Forward the email to a colleague to ask for their opinion

Click on the link to see where it takes you

Double-check the details and report it to your supervisor or IT department

Interact directly with the sender to confront them


Answer explanation

The safest action is to not engage with the suspicious email. You should verify its authenticity through official channels and immediately report it so security professionals can investigate.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?