No student devices needed. Know more
18 questions
Which of the following is an example of a “phishing” attack?
Sending someone an email that contains a malicious link that is disguised to look like an email from someone the person knows
Creating a fake website that looks nearly identical to a real website in order to trick users into entering their login information
Sending someone a text message that contains a malicious link that is disguised to look like a notification that the person has won a contest
All of the options
Which of the following four passwords is the most secure?
Boat123
WTh!5Z
into*48
123456
Criminals access someone’s computer and encrypt the user’s personal files and data. The user is unable to access this data unless they pay the criminals to decrypt the files. This practice is called …
Botnet
Ransomware
Driving
Spam
None of the above
If a public Wi-Fi network (such as in an airport or café) requires a password to access, is it generally safe to use that network for sensitive activities such as online banking (Finance) & system approvals?
Yes, It is safe
No, it is not safe
What kind of cybersecurity risks can be minimized by using a Virtual Private Network (VPN)?
Use of insecure Wi-Fi networks
Key-logging
De-anonymization by network operators
Phishing attacks
Cyber security protection of an organization is the responsibility of:
Everyone in the organization.
The CIO or CISO executive / IT Department
A specialized cyber security defense team
The board of directors
Social engineering uses which aspects of human nature?
Trust manipulation
Desire to be helpful
Lack of understanding
All of the options
Which one of the following describes spam?
Gathering information about a person or organization without their knowledge.
Performing an unauthorized, usually malicious, action such as erasing files.
Putting unnecessary load on the network by making copies of files
Sending unwanted bulk messages<
Which one of the following could lead to the spread of a malicious program?
Maintaining regularly updated anti-virus software
Opening only virus-checked file attachments from known sources
Using a USB Flash Drive from an unknown source to exchange data.
Using only software that has been checked for viruses.
Which one of the following is the reason that users should log on with a username and password?
To be aware of who is in the building
To check up on the timekeeping of users
To protect computers against unauthorized use
To enable a personalized greeting for each use
Which one of the following statements about a password is TRUE?
It must be changed only if it is compromised
It must be registered with the system administrator
It cannot contain special character symbols
It should be changed regularly
Which one of the following shows respects for the confidentiality of information?
Discussing confidential information over the telephone
Disclosing confidential information only to authorized individuals
Uploading confidential information to a shared web site
Emailing confidential information to a colleague
Which one of the following is an example of phishing?
An email warning the recipient of a computer virus threat
An email directing the recipient to forward the email to friends
An email directing the recipient to enter personal details on a fake website
An email directing the recipient to download an attachment
Your business email account has been compromised and leaked in a data breach. What is the best course of action(s)?
Change your password immediately
Inform the security team of your organization
Change the Password on all sites where you use the same password
All the options
You receive an email with subject: "$5 million donation from Bill Gates" and in the email they ask you to provide your telephone number and full postal address to claim the money. What's the best action?
Reply with my phone number and postal address, I want the 5 million dollars
Forward the email to friends because sharing is caring
Report the email as spam and delete it
Imagine you find a USB device in the hallway at work. What's the best thing to do?
Pick it up and plug it in to see what’s on the USB device. Maybe you can identify the owner.
Leave it in the hallway or bring it to the reception desk, such that the person who lost it can get it back.
Pick it up, don't plug it in but inform your IT department because this could be a USB device containing malware to infect your company's systems.
Which URL(s) bring(s) you to Google’s Home Page?
Is the following statement true or false. Because operating system updates are time consuming and may need to restart the machine it's a good idea to postpone them as long as possible
Yes
No
Explore all questions with a free account