Leaflet
Don’t be an easy target! Create a cyber security culture in your place of work, school, or center to reduce the exposure to cyber security threats and data breaches. Stop | Think | Connect to transform your organization today.
Use code given by volunteer to download the brochure.
Download
Quick Heal Foundation
Download Brochure
Cyber Awareness Quiz Fill in your details By submitting this form you agree to the CSR Policy and Terms of Use 1 / 5 1) Choose correct example of two factor authentication. Pin entered after swipping card Finger print or Access card for entering office Finger print for accessing WhatsApp Web Finger print request after accessing social media site from different device 2 / 5 2) What is the main objective of cyber criminals in financial frauds? To steal money or financial information To spread viruses and malware To gain unauthorised access to devices All of the above 3 / 5 3) What is the purpose of antivirus software? To prevent viruses and malware To encrypt personal information To enhance device performance All of the above 4 / 5 4) Why are humans still the weakest link despite security training and resources? Threat actors spend their days thinking of new ways to exploit human vulnerabilities and are rewarded for their innovation. Most of the people take calls, mails asking for personal information casually & give away every detail Young people think "Friendship whether it is old or new, is more important than password or hotspot" All of the above 5 / 5 5) Which of the following is NOT a form of cyber attack? Phishing Hacking Spell checking Denial of Service (DoS) Your score is Share: LinkedIn Facebook Twitter 0%
Cyber Awareness Quiz
Fill in your details
By submitting this form you agree to the CSR Policy and Terms of Use
1 / 5
1) Choose correct example of two factor authentication.
2 / 5
2) What is the main objective of cyber criminals in financial frauds?
3 / 5
3) What is the purpose of antivirus software?
4 / 5
4) Why are humans still the weakest link despite security training and resources?
5 / 5
5) Which of the following is NOT a form of cyber attack?
Your score is
Share:
We use cookies to ensure that we give you the best experience on our website. If you continue, we will assume that you agree to our cookie policy. Close