1.
You’ve just got a warning from your bank that suspicious activity has been detected and to login immediately using a URL (link) provided. What is the best course of action to take?
2.
What should I do after I learn about a data breach of a website? Choose the best answer.
3.
Your email account has been compromised. What is the best way of preventing further unauthorized access to your email account?
4.
Which of the following is a good way to create a password?
5.
Why is information security important?
6.
You have an old laptop with work-related files still stored on it. You want to give the system away to charity. What is the safest way to keep the file contents confidential?
7.
A supplier has sent you a USB memory stick in the post which contains drawings of a project that you’re collaborating on. What is the safest course of action?
8.
Which of the following statements best describes the modern-day hacker?
9.
While browsing on a shopping site, you see an ad banner for one of your favorite charities, asking you to donate for a worthy cause. You decide to donate. You should
10.
Why is it important to have a good understanding of Information Security policies and procedures?
11.
Why are humans still the weakest link despite security training and resources?
12.
Your friend is late to meet you at your local café, and the café has open Wi-Fi. You’ve been meaning to take a look at a jewelry website that your mom likes to beat the Black Friday rush. You should:
13.
What is the most important security awareness training topic?
14.
True or False: Is it considered safe to use the same complex password on all websites?
15.
When travelling, you use a mobile disk carried in your laptop bag to back-up your system. What is the risk here?
16.
You get a call from your technical support helpdesk saying they are performing an urgent server upgrade. They ask you for your password. What should you do?
17.
You’ve inadvertently opened a web link contained in a suspicious email and now your computer is behaving strangely. What should course of action should you follow next?
18.
How often should you backup your data?
19.
Information Security is the responsibility of
20.
You have a highly sensitive document which you need to email to a trusted third-party. What is the safest way to send this?
21.
You receive an email with subject: "$5 million donation from Bill Gates" and in the email they ask you to provide your telephone number and full postal address to claim the money. What's the best action?
22.
What is the best way to validate a legitimate email vs. a phishing email?
23.
You’re creating a new account with a trusted online retailer and it’s prompting you to set up a password. What should you do to make the password as secure as possible?
24.
Information security aims to provide which three key services?
25.
Jim is planning a holiday to Spain. Using his smartphone, he finds a nice hotel, but all the information is only in Spanish. He downloads a free translation app to help him translate the information into English. What is the biggest risk here?
Thank you for the Quiz, Kindly check your email for the result.
Good Luck!