1.
What is the most common delivery method for viruses?
2.
How often should you backup your data?
3.
Unexpectedly, you get an email from a colleague who requests you to urgently click on an email link which they’ve sent you. What is the safest option?
4.
What should I do after I learn about a data breach of a website? Choose the best answer.
5.
Your friend is late to meet you at your local café, and the café has open Wi-Fi. You’ve been meaning to take a look at a jewelry website that your mom likes to beat the Black Friday rush. You should:
6.
You’re waiting for a package from overseas, but then you get a shipping delayed notification saying your package is stuck in Halifax! It's going to be returned to sender unless you click a link and confirm your shipping address. What should you do first?
7.
What is the most important security awareness training topic?
8.
You’ve just got a warning from your bank that suspicious activity has been detected and to login immediately using a URL (link) provided. What is the best course of action to take?
9.
Which of the following statements best describes the modern-day hacker?
10.
A supplier has sent you a USB memory stick in the post which contains drawings of a project that you’re collaborating on. What is the safest course of action?
11.
True or False: Is it considered safe to use the same complex password on all websites?
12.
Information security aims to provide which three key services?
13.
What does information security do?
14.
Which of the following is a good way to create a password?
15.
A colleague calls you telling you they have an urgent deadline to meet. But unfortunately, they have forgotten their password to the client database. What should you do to help?
16.
You’ve inadvertently opened a web link contained in a suspicious email and now your computer is behaving strangely. What should course of action should you follow next?
17.
You have a highly sensitive document which you need to email to a trusted third-party. What is the safest way to send this?
18.
Where should you store the encryption passphrase for your laptop?
19.
What is the best way to validate a legitimate email vs. a phishing email?
20.
Why is it important to have a good understanding of Information Security policies and procedures?
21.
Why are humans still the weakest link despite security training and resources?
22.
When travelling, you use a mobile disk carried in your laptop bag to back-up your system. What is the risk here?
23.
Jim is planning a holiday to Spain. Using his smartphone, he finds a nice hotel, but all the information is only in Spanish. He downloads a free translation app to help him translate the information into English. What is the biggest risk here?
24.
Your business email account has been compromised and leaked in a data breach. What is the best course of action(s)?
25.
Your email account has been compromised. What is the best way of preventing further unauthorized access to your email account?
Thank you for the Quiz, Kindly check your email for the result.
Good Luck!