2017 UB National Cybersecurity Awareness Month Quiz

An educational image depicting cybersecurity symbols such as locks, shields, and computer screens, with a vibrant and inviting background featuring digital elements.

Test Your Cybersecurity Knowledge!

Welcome to the 2017 UB National Cybersecurity Awareness Month Quiz! Test your understanding of essential cybersecurity practices, including how to create strong passwords, identify phishing attempts, and recognize malware threats.

Participate in this quiz and check your knowledge about cybersecurity with these key highlights:

  • Learn the importance of secure passphrases
  • Understand how phishing attacks work
  • Recognize the signs of malware
  • Find out how to report cybersecurity incidents
11 Questions3 MinutesCreated by GuardingData927
Please enter your UBITName.
A good way to create a passphrase is to:
A) Name it after your favorite pet (e.g. Smokey)
B) Use your phone number (e.g. 7166452222)
C) Use the first letters of a favorite catchphrase only you know or an entire movie/book title (e.g. IfdChwrmbw1w7! -- I fell down Cushing hill when riding my bike whe I was 7! -- OR -- G0neW1th_theW1nd!)
D) Name it after one of your children with his/her age (e.g. Julie07)
The best passphrases are:
A) Ones that contain letters and numbers
B) Ones that are long and contain lower and upper case letters, numbers, and characters, but are easy to remember
C) Ones that contain letters and numbers, but are easy to remember
D) Ones that contain letters, numbers, and characters
A phishing message is one in which the author is attempting to gain:
A) Information about your favorite restaurant
B) C and D
C) University information such as a username and password
D) Banking information such as an account number
If you think the email you received is a phishing attempt you should do all of the following except?
A) Do not reply to the message
B) Click the link so you can see what the site looks like
C) Keep your system up to date, and install up-to-date antivirus and anti-spyware software
D) Report the phishing email to abuse@buffalo.eduusing the directions found here: http://www.buffalo.edu/ubit/service-guides/safe-computing/report-phishing-attempt.html
Phishing messages often attempt to trick the reader by using which of the following:
A) Threats
B) A link that points to somewhere other than a real web page hosted by the University at Buffalo
C) Excellent grammar and spelling
D) A and B
Which statement most accurately describes malware?
A) A computer program that is used to perform malicious actions
B) A program that protects your computer from hackers
C) A program that is installed onto your computer that monitors your internet use
D) All of the above
Your device can become infected with malware by doing which of the following:
A) Opening an email attachment
B) Clicking on a link in an email attachment
C) Clicking on a legitimate web site with advertisements
D) All of the above
Which of the following is not a cyber-security incident?
A) Phishing
B) Data breach
C) Ransomware
D) Forgetting your password
If I suspect a cyber-security incident has occurred, I should report it to the UBIT Help Center:
A) Within 24 hours
B) Within 30 days
C) Immediately
D) I don’t need to report cyber-security incidents
In computer security, this describes a non-technical kind of intrusion that relies heavily on human interaction. It often involves tricking people into breaking their own security procedures.
A) Cyber terrorism
B) Debugging
C) Hijacking
D) Social engineering
{"name":"2017 UB National Cybersecurity Awareness Month Quiz", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Welcome to the 2017 UB National Cybersecurity Awareness Month Quiz! Test your understanding of essential cybersecurity practices, including how to create strong passwords, identify phishing attempts, and recognize malware threats.Participate in this quiz and check your knowledge about cybersecurity with these key highlights:Learn the importance of secure passphrasesUnderstand how phishing attacks workRecognize the signs of malwareFind out how to report cybersecurity incidents","img":"https:/images/course8.png"}
Powered by: Quiz Maker