Fill in the blanks
Ashley
Created on September 12, 2024
Over 30 million people build interactive content in Genially.
Check out what others have designed:
Transcript
Do you know Cybersecurity?
Take our interactive quiz to see how much you've learned during this National Cybersecurity Month.
Straight from our NCSAM Source Page, this policy is the best policy to have when handling sensitive information. Be sure to keep your workplace clutter-free and store all sensitive information in a secure cloud-base application.
By implementing a clean ______ policy we avoid compromising sensitive ____________
desk
note
screen
desk
information
skills
information
animation
FILL IN THE BLANKS
Be sure to disable ____________ whenever you are not using this feature to keep data secured.
Bluetooth
MFA
keyboards
Always ________ potential exposures of sensitive information.
sell
pronounce
report
Try to avoid connecting to public ______ so cyber criminals can't easily access your data.
MFA
WiFi
phones
Bluetooth
report
WiFi
FILL IN THE BLANKS
Straight from our NCSAM Source Page, email messages that contain the warning signs might be a threat. Be sure to review your email messages thoroughly before reacting to the message.
Incorrect __________ is a major indicator that an email message is a ________
grammar
graphs
sounds
grammar
phish
title
phish
data
FILL IN THE BLANKS
Storing your usernames and passwords in a password ________ is a secure way to keep your info safe.
vault
notebook
notebook
Always ________ the identity of a caller before proceeding with a call.
sell
forget
verify
"ACTION NEEDED" is an example of urgent and emotional ___________
report
language
emails
vault
verify
language
FILL IN THE BLANKS
Straight from our NCSAM Source Page, check out the title and you will know that this is the national month for cybersecurity!
__________ is National Cybersecurity Month
October
July
December
October
FILL IN THE BLANKS
You know Cybersecurity!
Thank you for taking our interactive quiz! We hope you continue your learning path when it comes to important cybersecurity topics.