1.
Which of the following is a measure for preventing a social engineering attack except:
2.
The Information Security Policy and related policies only apply to electronic and hardcopy records and does not apply to verbal discussions?
3.
Why is it necessary for everyone to have a good understanding of Information Security policies and procedures?
4.
TRUE or FALSE: Attachments should always be treated with caution, even if you know the sender.
5.
Which is the following is true about phishing? 1. It is a type of cybersecurity attack that attempts to obtain data that are sensitive like usernames, passwords, and more. 2. It is carried out by email spoofing, instant messaging, and text messaging.
6.
When visiting your favorite website, a pop-up appears that reads "You have won a free Apple iPod!" What should you do?
7.
What must be done if your password has been compromised?
8.
Which action below would breach the Clear Desk and Screen Policy?
9.
A policy that outlines how to maintain information in the user’s possession for a predetermined length of time is known as?
10.
In cryptography, which of the following basic protection ensures that the information is correct and no unauthorizes person or malicious software has altered that data?
11.
Which of the following is a common delivery method for viruses?
12.
Developing an outline of procedures that are to be followed in the event of a major IT incident impacting availability is known as ------------?
13.
What is the only true guarantee against data loss due to a cyberattack such as ransomware?
14.
Your supervisor is very busy and asks you to log into the HR Server using her user-ID and password to retrieve some reports. What should you do?
15.
Which of the following terms best describes ensuring the data is accessible to authorized users?
16.
You receive a text message warning you that your bank account has been suspended. If says that you must click on the link in the SMS and update your credentials with the next 24 hours. Is this message safe or unsafe?
17.
----------- ensures that only authorized parties can view the information?
18.
Which of the following passwords meets your company password requirements?
19.
The mouse on your computer screen starts to move around on its own and click on things on your desktop. What do you do first?
20.
All of these are good physical security practices except?
Thank you for the Quiz, Kindly check your email for the result.
Good Luck!