Answer a series of 16 questions based on the information you have already learned.
0 of 16 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Time has elapsed
Your answers have now been transferred to your Mentor who will assess and get back to you with feedback.
This response will be reviewed and graded after submission.
2) Explain the meaning of the term phishing?
This response will be reviewed and graded after submission.
3) Provide an example of a phishing scam
This response will be reviewed and graded after submission.
4) Describe one way in which ransomware can infect your device.
This response will be reviewed and graded after submission.
5) Where can businesses find information about how to manage online business activities securely?
This response will be reviewed and graded after submission.
6) Describe the process at your organisation for reporting suspicious cyber activity.
This response will be reviewed and graded after submission.
7) Under what circumstances does a data breach need to be reported to the OAIC?
This response will be reviewed and graded after submission.
8) Describe the role of the OAIC
This response will be reviewed and graded after submission.
9) True or false? All data breaches need to be reported to the OAIC?
This response will be reviewed and graded after submission.
True or false? A business has 7 days to investigate whether a data breach is likely to cause serious harm?
This response will be reviewed and graded after submission.
11) True or false? Once you have determined a strong, secure password, it is recommended that you use this password across all of your online accounts?
This response will be reviewed and graded after submission.
12) What is a password manager?
This response will be reviewed and graded after submission.
13) Why is it important to update apps and operating systems as soon as updates are available?
This response will be reviewed and graded after submission.
14) What is multifactor authentication?
This response will be reviewed and graded after submission.
15) True or false? From a cyber security perspective, it is recommended that all unused apps are deleted from devices?
This response will be reviewed and graded after submission.
16) How can physical devices be secured to protect personal and business information?
This response will be reviewed and graded after submission.