Cybersecurity Awareness Test For Non-IT Staff
Quiz-summary
0 of 20 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
Information
You must specify a text. |
|
You must specify a text. |
|
You must specify an email address. |
.
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 20 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
-
Thank you for taking our IT Security Assessment Test
Time Is Up , A copy of your results is already in your E-Mail box
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- Answered
- Review
-
Question 1 of 20
1. Question
5 pointsAn example of a complex password is:
-
Question 2 of 20
2. Question
5 pointsAn email that attempts to trick a reader into installing software that may contain a virus or ask for confidential information is an example of a:
-
Question 3 of 20
3. Question
5 pointsEncryption is a strong control for protecting information but it only works on laptops.
-
Question 4 of 20
4. Question
5 pointsWhich is an example of PII? (Personally identifiable information (PII) )
-
Question 5 of 20
5. Question
5 pointsIf you are sending an email containing PII or sensitive data you must send it encrypted.
-
Question 6 of 20
6. Question
5 pointsWhat is a way to protect PII and sensitive data from office visitors?
-
Question 7 of 20
7. Question
5 pointsEncryption is best described as:
-
Question 8 of 20
8. Question
5 pointsWhich method used by hackers is also called “Password Cracking” and can repeatedly guess different passwords to get access to your accounts?
-
Question 9 of 20
9. Question
5 pointsIf you install software from the internet there is a possibility that viruses or malware could infect your computer and access PII or sensitive data.
-
Question 10 of 20
10. Question
5 pointsTo make a password complex you should:
-
Question 11 of 20
11. Question
5 pointsA malicious macro cannot run until you click the “Enable Content” or “Enable Editing” button.
-
Question 12 of 20
12. Question
5 pointsTo protect PII and sensitive data, you only need to be worried about outsider threats such as hackers, Phishing Scams and ransomware.
-
Question 13 of 20
13. Question
5 pointsPasswords should be kept the same for all online accounts you are accessing so it is easier for you to remember them.
-
Question 14 of 20
14. Question
5 pointsWhat is the best definition of Spear Phishing?
-
Question 15 of 20
15. Question
5 pointsThe process that can be used to monitor system access for inappropriate or malicious activity is best known as _____.
-
Question 16 of 20
16. Question
5 pointsPhysical security is not an important aspect of protecting PII and sensitive data
-
Question 17 of 20
17. Question
5 pointsWhich of the following is true of a keylogger?
-
Question 18 of 20
18. Question
5 pointsEncryption is the process of transforming information into an unreadable code.
-
Question 19 of 20
19. Question
5 pointsWhat is a step that you can take to minimize the chance and impact of a ransomware attack?
-
Question 20 of 20
20. Question
5 pointsIf you get a suspicious phone call at work from a representative at Microsoft claiming that your computer is infected with a virus, you should: