https://www.cyber.gov.au/acsc/individuals-and-families/threats https://www.cyber.gov.au/acsc/small-and-medium-businesses https://www.scamwatch.gov.au/ https://www.oaic.gov.au/privacy/notifiable-data-breaches/about-the-notifiable-data-breaches-scheme https://www.pwc.com.au/digitalpulse/cyber-security-preparation-technology-legal-risk.html https://www.youtube.com/watch?v=JpfEBQn2CjM https://www.youtube.com/watch?v=p6ivTpTtWS0
0 of 4 Questions completed
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 4 Questions answered correctly
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Not quite there yet. Try again!
You need to answer all the questions correctly to progress to the next unit. Click the View Questions button to view the correct and incorrect answers and then click Restart Quiz to go back and try again!
Congratulations- you’ve completed the checkpoint!
Click the ‘Click here to continue’ button to move to the next topic.
Viruses, worms, spyware and trojans are all forms of:
Which of the following is not an effective way of protecting against malware?
If you are unsure about the legitimacy of an email, phone call or text message the safe thing to do is:
In the event of a ransomware attack, Cyber.gov.au advises to: