Want to create interactive content? It’s easy in Genially!

Get started free

Cyber awarenes quizz 2

Alexandrina Palii

Created on October 17, 2024

Start designing with a free template

Discover more than 1500 professional designs like these:

Smart Quiz

Essential Quiz

Practical Quiz

Akihabara Quiz

Piñata Challenge

Math Calculations

Pixel Challenge

Transcript

QUIZ

Cyber Awarnes

Play

What is multi-factor authentication (MFA)?

A type of computer virus

A way to store passwords securely

Using more than one method to verify your identity when logging in

A way to store files securely

What is multi-factor authentication (MFA)?

A type of computer virus

A way to store passwords securely

Using more than one method to verify your identity when logging in

A way to store files securely

Next

Which of the following is an example of malware?

A malicious program that infects your computer, like a virus or trojan

A software update from your operating system

An app that improves your device’s performance

A tool that manages network traffic

Which of the following is an example of malware?

A malicious program that infects your computer, like a virus or trojan

A software update from your operating system

An app that improves your device’s performance

A tool that manages network traffic

Next

How can access control help protect sensitive data?

It stores all your data on cloud servers

It monitors network activity for threats

It automatically backs up your files

It restricts who can view or use specific information

How can access control help protect sensitive data?

It stores all your data on cloud servers

It monitors network activity for threats

It automatically backs up your files

It restricts who can view or use specific information

Next

If you notice suspicious activity on your computer, what should you do first?

Restart your computer to fix the problem

Install new software to block the issue

Inform your IT department or security team

Delete all files on your hard drive

If you notice suspicious activity on your computer, what should you do first?

Restart your computer to fix the problem

Install new software to block the issue

Inform your IT department or security team

Delete all files on your hard drive

Next

Which of these is an indicator of a phishing attack?

A message from a trusted colleague

An email with poor grammar and suspicious links

A text message from your phone provider

A security update from your IT department

Which of these is an indicator of a phishing attack?

A message from a trusted colleague

An email with poor grammar and suspicious links

A text message from your phone provider

A security update from your IT department

Next

You protected yourself onine

Wrong answer