cybersecurity

Welcome to the Cyber Security Information,Training & Reporting Platform

Report a cyberthreat

Education & Training

Learn Cyber Security

Technology is bringing a massive wave of evolution on learning things in different ways.

Featured Courses

Discover Your Perfect Program In Our Courses.

Cybersecurity

Introduction to Cybersecurity

Cybersecurity

Test your knowledge of cybersecurity.

/5
1 votes, 5 avg
10
Created on

Test your Cyber Security knowledge

Cyber Security quiz helps us to increase our cyber knowledge.

1 / 5

Which of the following should you do to restrict access to your devices and data?

2 / 5

Which of these is an example of a phishing attack?

3 / 5

Cybercriminals access someone's system and encrypt their personal data and files. The user is unable to access data unless they pay cybercriminals to decrypt the files. It is known as

4 / 5

Turning off the GPS of your device prevents any tracking of your location.

5 / 5

What kind of cybersecurity risks can be mitigated by using a VPN?

Your score is

0%

Please rate this quiz

1
Created on

CYBER SECURITY FUNDAMENTALS

This quiz will help you understand the fundamentals of cyber security

1 / 5

A means to point you to a malicious and illegitimate website by redirecting the legitimate URL. Even if the URL is entered correctly, it can still be redirected to a fake website.

2 / 5

Each computer with internet access is assigned

3 / 5

Whom among the following hackers are permitted to Hack legally

4 / 5

Data cannot be changed without authorization is an example of?

5 / 5

Which of the following is the best definition for cybersecurity?

Your score is

The average score is 80%

0%

0
Created on

TEST YOUR CYBER SECURITY AWARENESS

This quiz will help you test and understand cyber security awareness

1 / 5

Which one of the following describes what you should do if you receive a chain letter email?

2 / 5

Which one of the following describes why it is important to update antivirus software regularly?

3 / 5

Which one of the following could lead to the spread of a malicious program?

4 / 5

Which one of the following can protect a computer from the risk of unwanted emails?

5 / 5

Which one of the following describes spam?

Your score is

The average score is 0%

0%

1
Created on

Cyber Security Basics

Do you know how to help protect your files and devices from potential cyber-attacks? Test your knowledge now!

1 / 5

Which is the best answer for which people in a business should be responsible for cybersecurity?

2 / 5

Which of the following is the best answer for how to secure your router?

3 / 5

Cybercriminals only target large companies. True or False?

4 / 5

Backing up important files offline, on an external hard drive, or in the cloud, will help protect your business in the event of a cyber attack?

5 / 5

Do you know how to help protect your files and devices from potential cyber-attacks?

Your score is

The average score is 100%

0%

0
Created on

Physical Security Quiz

Strong physical security is an important part of cybersecurity. Test your physical security knowledge now!

1 / 5

Only people with access to sensitive data need to be trained on the importance of the physical security of files and equipment.

2 / 5

Which one of these statements is true?

3 / 5

When you hit the “delete” key, that means a file is automatically removed from your computer.

4 / 5

Paper files that have sensitive information should be disposed of in a locked trash bin.

5 / 5

Promoting physical security includes protecting:

Your score is

The average score is 0%

0%

0
Created on

SECURE REMOTE ACCESS QUIZ

Do you know which security standards you should follow before connecting to the company network remotely?

1 / 5

Before connecting remotely to the company network, your personal device should meet the same security requirements as company-issued devices.

2 / 5

What is a common way to help protect devices connected to the company network?

3 / 5

Keeping your router’s default name will help security professionals identify it and thus help protect your network’s security.

4 / 5

WPA2 and WPA3 encryption are the encryption standards that will protect information sent over a wireless network.

5 / 5

Which of the following describes the best way to make sure you are securely accessing the company network remotely?

Your score is

The average score is 0%

0%

Why Study With ICT

Discover Your Perfect Program In Our Courses.

Learn Anything

Flexible Learning

Learn With Experts

Lifetime Access

Test your cybersecurity Knowledge

/5
0
Created on

Uncategorized

Cyber

1 / 5

Category: Uncategorized

Which of the following should you do to restrict access to your devices and data?

2 / 5

Category: Uncategorized

What kind of cybersecurity risks can be mitigated by using a VPN?

3 / 5

Category: Uncategorized

Turning off the GPS of your device prevents any tracking of your location.

4 / 5

Category: Uncategorized

Cybercriminals access someone's system and encrypt their personal data and files. The user is unable to access data unless they pay cybercriminals to decrypt the files. It is known as

5 / 5

Category: Uncategorized

Which of these is an example of a phishing attack?

Your score is

The average score is 0%

0%