1.
Why are humans still the weakest link despite security training and resources?
2.
You’ve just got a warning from your bank that suspicious activity has been detected and to login immediately using a URL (link) provided. What is the best course of action to take?
3.
Your email account has been compromised. What is the best way of preventing further unauthorized access to your email account?
4.
Information Security is the responsibility of
5.
When travelling, you use a mobile disk carried in your laptop bag to back-up your system. What is the risk here?
6.
You’re creating a new account with a trusted online retailer and it’s prompting you to set up a password. What should you do to make the password as secure as possible?
7.
While browsing on a shopping site, you see an ad banner for one of your favorite charities, asking you to donate for a worthy cause. You decide to donate. You should
8.
Jim is planning a holiday to Spain. Using his smartphone, he finds a nice hotel, but all the information is only in Spanish. He downloads a free translation app to help him translate the information into English. What is the biggest risk here?
9.
You have a highly sensitive document which you need to email to a trusted third-party. What is the safest way to send this?
10.
What does information security do?
11.
Where should you store the encryption passphrase for your laptop?
12.
A colleague calls you telling you they have an urgent deadline to meet. But unfortunately, they have forgotten their password to the client database. What should you do to help?
13.
Your friend is late to meet you at your local café, and the café has open Wi-Fi. You’ve been meaning to take a look at a jewelry website that your mom likes to beat the Black Friday rush. You should:
14.
What should I do after I learn about a data breach of a website? Choose the best answer.
15.
You get a call from your technical support helpdesk saying they are performing an urgent server upgrade. They ask you for your password. What should you do?
16.
What is the most common delivery method for viruses?
17.
You receive an email with subject: "$5 million donation from Bill Gates" and in the email they ask you to provide your telephone number and full postal address to claim the money. What's the best action?
18.
How often should you backup your data?
19.
Why is it important to have a good understanding of Information Security policies and procedures?
20.
Which of the following statements best describes the modern-day hacker?
21.
What is the best way to validate a legitimate email vs. a phishing email?
22.
Unexpectedly, you get an email from a colleague who requests you to urgently click on an email link which they’ve sent you. What is the safest option?
23.
You’ve inadvertently opened a web link contained in a suspicious email and now your computer is behaving strangely. What should course of action should you follow next?
24.
You have an old laptop with work-related files still stored on it. You want to give the system away to charity. What is the safest way to keep the file contents confidential?
25.
Which of the following is a good way to create a password?
Thank you for the Quiz, Kindly check your email for the result.
Good Luck!