Maha Cybersecurity Quiz
Cyber Quiz
1.
Which one of the following is the unsafe online activity?
*
Using a screen name or nick name that cannot identify you.
Meeting someone you met online face-to-face in the company of your parents.
C. Keeping your social network profile private.
D. Giving your home address to someone you met in a chat room.
2.
A colleague calls you and informs you that he has forgotten his password, how would you help him?
*
Suggest him to try various combinations of his credentials.
Suggest him that he should call to IT helpdesk for a password reset link.
Give your login credentials temporarily so your colleague can login.
Put your login credentials on an encrypted USB memory stick and hand it to him.
3.
You’ve just moved to a new department and have been issued with a new set of passwords. Which one of these methods offers you the safest option?
*
Write them down in a notebook beside your desk for handy reference.
Use a sticky note making sure you place under your keyboard instead of on or near your computer.
Store them in an Excel file on your computer but give the file name something unrelated to passwords.
Memorize the passwords.
4.
Who or what is the weakest link in the security chain?
*
Human Beings
Security Applications
Artificial Intelligence
No one
5.
Which of the following is a good practice to avoid email viruses?
*
Delete an unexpected or unsolicited message
Use anti-virus software to scan attachments before opening
Delete similar messages that appears more than once in your Inbox
All the above
6.
Which of the following is a measure for preventing a social engineering attack except:
*
Do not give out computer or network information
Do not complete confidential company tasks in an unsecure setting
Do not secure sensitive documents and media
Do not give out personal identifiable information
7.
What is ransomware?
*
Software that infects computer networks and mobile devices to hold your data hostage until you send the attackers money.
Computer equipment that criminals steal from you and won’t return until you pay them.
Software used to protect your computer or mobile device from harmful viruses.
A form of cryptocurrency.
8.
How will you keep your phone secure?
*
Set up a simple password that is easy for you to remember
Write your name and address and your phone number on the back
Update the operating system, software and apps regularly
Turn off ‘Find my phone’ or ‘Find my device’
9.
When constructing a password, you should:
*
You should use your family member name, sports name, pet name and add a number on the end
Use phrases or misspelled words with embedded numbers and special characters
Use sequenced letters and numbers from your keyboard
All of the above
10.
Which one of the following describes spam?
*
Gathering information about a person or organisation without their knowledge.
Performing an unauthorised, usually malicious, action such as erasing files.
Putting unnecessary load on the network by making copies of files.
Sending unwanted bulk messages.
Submit