cybersecurity
Report a cyberthreat
Uncategorized
Cyber
1 / 5
Category: Uncategorized
Which of the following should you do to restrict access to your devices and data?
2 / 5
What kind of cybersecurity risks can be mitigated by using a VPN?
3 / 5
Turning off the GPS of your device prevents any tracking of your location.
4 / 5
Cybercriminals access someone's system and encrypt their personal data and files. The user is unable to access data unless they pay cybercriminals to decrypt the files. It is known as
5 / 5
Which of these is an example of a phishing attack?
Your score is
The average score is 0%
Restart quiz