1.
You’ve just got a warning from your bank that suspicious activity has been detected and to login immediately using a URL (link) provided. What is the best course of action to take?
2.
A supplier has sent you a USB memory stick in the post which contains drawings of a project that you’re collaborating on. What is the safest course of action?
3.
While browsing on a shopping site, you see an ad banner for one of your favorite charities, asking you to donate for a worthy cause. You decide to donate. You should
4.
Information Security is the responsibility of
5.
Your business email account has been compromised and leaked in a data breach. What is the best course of action(s)?
6.
How often should you backup your data?
7.
A colleague calls you telling you they have an urgent deadline to meet. But unfortunately, they have forgotten their password to the client database. What should you do to help?
8.
Why are humans still the weakest link despite security training and resources?
9.
What is the best way to validate a legitimate email vs. a phishing email?
10.
Why is information security important?
11.
You get a call from your technical support helpdesk saying they are performing an urgent server upgrade. They ask you for your password. What should you do?
12.
Your email account has been compromised. What is the best way of preventing further unauthorized access to your email account?
13.
What should I do after I learn about a data breach of a website? Choose the best answer.
14.
What is the most important security awareness training topic?
15.
Where should you store the encryption passphrase for your laptop?
16.
Information security aims to provide which three key services?
17.
Why is it important to have a good understanding of Information Security policies and procedures?
18.
You’re creating a new account with a trusted online retailer and it’s prompting you to set up a password. What should you do to make the password as secure as possible?
19.
You’ve inadvertently opened a web link contained in a suspicious email and now your computer is behaving strangely. What should course of action should you follow next?
20.
What does information security do?
21.
You have a highly sensitive document which you need to email to a trusted third-party. What is the safest way to send this?
22.
Which of the following statements best describes the modern-day hacker?
23.
You receive an email with subject: "$5 million donation from Bill Gates" and in the email they ask you to provide your telephone number and full postal address to claim the money. What's the best action?
24.
What is the most common delivery method for viruses?
25.
You have an old laptop with work-related files still stored on it. You want to give the system away to charity. What is the safest way to keep the file contents confidential?
Thank you for the Quiz, Kindly check your email for the result.
Good Luck!