1) You are arranging your birthday party and want to use a social media website to do so. You decide to treat yourself and get a coffee while you do. After connecting to the public WiFi you log into the website and create your event. A week later your family and friends start telling you about some weird messages they have received from you containing a link. a) Phishing b) Blagging c) Shouldering d) Pharming 2) A colleague has recently been the target of a social engineering attack. They took a phone call the other day from a very stressed sounding customer who could not remember their security information. After 30 minutes, your colleague decided to help them out and reset their password for them. Later on in the day, the customer called back saying they had been locked out and they had no recollection of the call. a) Phishing b) Blagging c) Shouldering d) Pharming 3) You receive an email that appears to come from Amazon. They say that there is a problem with your payment information and that you owe them a significant amount of money. You go to click on a link and notice that the URL is not from Amazon. a) Phishing b) Blagging c) Shouldering d) Pharming 4) Late one night, you are working on an important presentation and you need a GIF to really spice it up. You search online for a GIF maker and download the first one you see, the website looks suspicious but you are in a rush. When you run the “installer”, your computer goes blank, a minute later a message appears on the screen demanding £200 to decrypt your data. a) Ransomware b) Virus c) Trojan d) Adware 5) A friend brings you their laptop and asks if you can take a look at it. You open the laptop and immediately you see the problem, there are pop up ads everywhere. a) Ransomware b) Virus c) Trojan d) Adware 6) You recently installed a new piece of image editing software on your computer. After a few days, you notice that your webcam keeps turning on when you are not using the computer. You run your anti-malware and it identifies the cause of the infection as the image editing software you downloaded. It appears to be a legitimate program that is actually malware. a) Ransomware b) Virus c) Trojan d) Adware 7) You download a file onto your computer, when the download finishes your antivirus software warns you about the file potentially being harmful. The antivirus software takes the file and isolates it so it can be checked without harming the rest of your files. a) Encrypted it b) Quarantined it c) Cleaned it d) Deleted it 8) Complete the sentence: ‘Bringing your own device is usually…’ a) More risky than using work-supplied devices b) Just as risky as using work-supplied devices c) Less risky than using work-supplied devices 9) Which of the following is more likely to be the victim of a cyberattack? a) Small Business  b) Large Business c) Any Business 10) Of the following passwords, which is the most secure? a) 123456 b) dragon c) Bi%DuIn!So57Lo d) iLoVeYou e) 1q2w3e4r 11) Which of the following is the biggest cybersecurity threat to your organisation? a) People inside your organisation b) People outside your organisation c) Can be both 12) Which of the following do you think is the most important aspect of cybersecurity for businesses? Please select all that apply. a) Installing antivirus/anti-malware on all computers b) Training for staff (including non-IT employees) c) Using strong passwords d) Using two-factor authentication (for example, having to verify your login using your phone) e) Complying with data protection laws f) Use a open network in your business 13) Select the statement you believe to be most accurate. a) All staff should have training on spotting the signs of a cyberattack b) Specific staff (for example, IT professionals) should have training on spotting the signs of a cyberattack c) If a business has adequate antivirus software, staff shouldn’t need any training on spotting the signs of a cyberattack 14) Which types of Wi-Fi do you think are safe to connect your work computer or phone to outside the office? Select all that apply. a) Free, open community Wi-Fi, for example in city centers b) Free, open Wi-Fi in cafes and restaurants, museums and public buildings, and airports and train stations c) Pay-to-access Wi-Fi on transport and in hotels d) Private Wi-Fi, for example at a friend’s house 15) What is the weakest link in cybersecurity? a) Weak encryption b) Humans c) Short passwords

Leaderboard

Visual style

Options

Switch template

Continue editing: ?