KEEP-CYBER-SAFE

A visually engaging image depicting cybersecurity concepts, such as a lock symbol, computer screens with warning signs, and representations of phishing email threats, designed to evoke a sense of security and awareness.

Keep Cyber Safe Quiz

Test your knowledge about cybersecurity with our engaging quiz! By participating, you'll learn essential practices to keep your online presence secure.

Topics covered include:

  • Understanding threats
  • Safe internet practices
  • Password management
  • Recognizing phishing attempts
11 Questions3 MinutesCreated by ProtectingData42
What is the name of the webpage?
Https://cybersafe.celanese.com/
Https://keepsafe.celanese.com/
Https://security.celanese.com/
Https://cyber.safe.celanese.com/
Between 2016 and 2017, non-external threats resulted in over ________ lost or stolen business records worldwide.
500.000
250 million
1 million
3.000
How can you lock your PC?
Pressing the “Windows” and “L” keys simultaneously
Pressing Ctrl+Alt+Delete, then selecting “Lock”
Opening the start menu, pressing your profile icon, and then selecting “lock”
Pressing the “AltGr” and “L” keys simultaneously
What is the difference between phishing and vishing?
Phishing typically refers to emails, while vishing refers to phone calls
Vishing is the German word for phising
Phishing = the activity of catching fish, either for food or as a sport
Vishing = want something that cannot or probably will not happen
How can phising/vishing be reported?
Report to the line manager
Call Rajesh or one of the directors
By clicking on the Report Phishing button
Contact the Service Desk
What should we NOT do with our password?
Reuse old passwords
Use complex, unique passwords for each of your accounts
Share with others
Change after 90 days
Which of the following link(s) is/are suspicious?
Http://ucd.login.dummy.com/ucdlogin.htm
MyOTPaccount.hu
Https://amgdcdra1.sw.czds.bz/draclient/#/home
Https://chelenase-tx.sharefile.com/Authentication/Login
What is a malware program?
Is a browser-based tool that covers all the design stages for a digital product designer.
Is any program or file that is harmful to a computer user. Types of malware can include computer viruses, worms, Trojan horses and spyware.
Is a Microsoft's storage service for hosting files in the "cloud".
Is an event with a primary focus on comic books and comic book culture, in which comic book fans gather to meet creators, experts, and each other
On average, companies take _____ days to notice a data breach, giving criminals ample time to circulate stolen sensitive company information to multiple sources.
3
28
197
7
Signs of a potential data breach include:
Changes in critical files/folders
Unrequested password changes
Increased time to perform routine tasks
Abnormal activity, I.e. pop-ups, new tabs open on browser
What should we NOT do?
Click on unknown or suspicious links
Download unknown applications or programs to your computer
Downloading files or email attachments from unknown sources
Be aware and check https://cybersafe.celanese.com/ for further info
{"name":"KEEP-CYBER-SAFE", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge about cybersecurity with our engaging quiz! By participating, you'll learn essential practices to keep your online presence secure.Topics covered include:Understanding threatsSafe internet practicesPassword managementRecognizing phishing attempts","img":"https:/images/course1.png"}
Powered by: Quiz Maker