Cyber Security 2023

Name:
 
What is ransomware?
Software that infects computer networks and mobile deviecs to hold your data hostage until you send the attackers money.
Computer equipment that criminals steal from you and won't return until you pay them.
Software used to protect your computer or mobile device from harmful viruses.
A form of cryptocurrency
You’ve inadvertently opened a web link contained in a suspicious email and now your computer is behaving strangely. What should course of action should you follow next?
The purpose of a firewall and security software is to block malicious code, hence no action is required
Update and run anti-virus software
Contact IT help desk immediately
Keep an eye on the performance of your computer
Who are the targets of modern day hackers?
Banks and finance companies who process a lot of payment
Any organisation or individual is liable to be the victim of hackers
Companies which hold a lot of proprietary information
Companies which hold credit card number of customers
What is the best way to validate a legitimate email vs. A phishing email?
Bad spelling, poor syntax and grammar are one of the tell-tale signs of a fake email.
Look at the email headers to see where it really came from.
Look for poorly replicated logos.
Contact the sender on some other medium besides email to verify whether they sent you the email.
Your colleague calls you telling you they have an urgent deadline to meet, but they are logged out from the application. What should you do to help?
Go to a computer terminal and login using your colleague's user ID and password so they can meet the deadline
Suggest to your colleague that you are unable to help. Password sharing is not allowed and poses security risks
Give them your login credentials temporarily so your colleague can meet the deadline
Put your login credentials in an encrypted email and send it to your colleague
What is the difference between phishing and spear phishing?
Phishing is more targeted than spear phishing
Spear phishing is more targeted than phishing
Phishing is done through email, while spear phishing is done through social media
Spear phishing is done through email, while phishing is done through social media
You’ve just moved to a new department and have been issued with a new set of passwords. Which one of these methods offers you the safest option for storing them
Write them down in a notebook beside your desk for handy reference.
Use a sticky note making sure you place under your keyboard instead of on or near your computer.
Store them in an Excel file on your computer but give the file name something unrelated to passwords.
Use the password management tool supplied/authorised by your organisation.
Paying the ransom to the hackers guarantees you will get your data back after a ransomware attack.
True
False
You’re being texted that your parcel delivery will be delayed. In order to expedite it you need to?
Call the SMS number
Reply to the text
Click on the link provided in the sms
Think first. Am I expecting anything? If not report and delete the sms
Which of the following statements are correct?
Phishing is a form of social engineering.
Phishing is a so called "spray and pray" technique in which an attacker sends out the same email to hundreds of potential targets in the hope they will fall victim.
Phishing attempts to gain victims' trust
All of the above
{"name":"Cyber Security 2023", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Name:, What is ransomware?, You’ve inadvertently opened a web link contained in a suspicious email and now your computer is behaving strangely. What should course of action should you follow next?","img":"https://www.poll-maker.com/3012/images/ogquiz.png?sz=1200-00000000001000005300"}
Powered by: Quiz Maker