1.
Your email account has been compromised. What is the best way of preventing further unauthorized access to your email account?
2.
What should I do after I learn about a data breach of a website? Choose the best answer.
3.
You’ve just got a warning from your bank that suspicious activity has been detected and to login immediately using a URL (link) provided. What is the best course of action to take?
4.
You’ve inadvertently opened a web link contained in a suspicious email and now your computer is behaving strangely. What should course of action should you follow next?
5.
Which of the following is a good way to create a password?
6.
You have a highly sensitive document which you need to email to a trusted third-party. What is the safest way to send this?
7.
A colleague calls you telling you they have an urgent deadline to meet. But unfortunately, they have forgotten their password to the client database. What should you do to help?
8.
You receive an email with subject: "$5 million donation from Bill Gates" and in the email they ask you to provide your telephone number and full postal address to claim the money. What's the best action?
9.
A supplier has sent you a USB memory stick in the post which contains drawings of a project that you’re collaborating on. What is the safest course of action?
10.
Information security aims to provide which three key services?
11.
True or False: Is it considered safe to use the same complex password on all websites?
12.
You’re waiting for a package from overseas, but then you get a shipping delayed notification saying your package is stuck in Halifax! It's going to be returned to sender unless you click a link and confirm your shipping address. What should you do first?
13.
You’re creating a new account with a trusted online retailer and it’s prompting you to set up a password. What should you do to make the password as secure as possible?
14.
What is the most important security awareness training topic?
15.
Why is it important to have a good understanding of Information Security policies and procedures?
16.
When travelling, you use a mobile disk carried in your laptop bag to back-up your system. What is the risk here?
17.
Your friend is late to meet you at your local café, and the café has open Wi-Fi. You’ve been meaning to take a look at a jewelry website that your mom likes to beat the Black Friday rush. You should:
18.
You have an old laptop with work-related files still stored on it. You want to give the system away to charity. What is the safest way to keep the file contents confidential?
19.
Jim is planning a holiday to Spain. Using his smartphone, he finds a nice hotel, but all the information is only in Spanish. He downloads a free translation app to help him translate the information into English. What is the biggest risk here?
20.
What is the most common delivery method for viruses?
21.
What is the best way to validate a legitimate email vs. a phishing email?
22.
Where should you store the encryption passphrase for your laptop?
23.
Unexpectedly, you get an email from a colleague who requests you to urgently click on an email link which they’ve sent you. What is the safest option?
24.
You get a call from your technical support helpdesk saying they are performing an urgent server upgrade. They ask you for your password. What should you do?
25.
Which of the following statements best describes the modern-day hacker?
Thank you for the Quiz, Kindly check your email for the result.
Good Luck!