Information Security Awareness Training

20 Questions | Total Attempts: 915

SettingsSettingsSettings
Security Quizzes & Trivia

Information Technology Course - Information Security Awareness Training


Questions and Answers
  • 1. 
    What technique used by unauthorized individuals to gain access to secure areas?
    • A. 

      Sneaking

    • B. 

      Tracking

    • C. 

      Tailgating

    • D. 

      Cracking

  • 2. 
    Which event below is not an information security event you are required to report?
    • A. 

      Loss/Theft of computer equipment

    • B. 

      Forgetting your password

    • C. 

      Distribution of confidential information to unauthorized persons

    • D. 

      Unauthorized access to information systems

  • 3. 
    Phishing attacks only occur via email?
    • A. 

      True

    • B. 

      False

  • 4. 
    At a minimum, approximately how often should you change your password?
    • A. 

      Every 2 Weeks

    • B. 

      Every Month

    • C. 

      Every 3 Months

    • D. 

      Every 6 months

  • 5. 
    Which of the following is not recommended as part of a secure password?
    • A. 

      Number

    • B. 

      Dictionary Word

    • C. 

      Special Character

    • D. 

      Capital Letter

  • 6. 
    Which combination of keys can you use to quickly lock your computer before leaving it unattended?
    • A. 

      Ctrl + L

    • B. 

      Alt + L

    • C. 

      Windows Key + L

    • D. 

      Ctrl +Alt + Del

  • 7. 
    Which is not a human desire that cyber criminals exploit when using social engineering techniques?
    • A. 

      Trust

    • B. 

      Spite

    • C. 

      Curiosity

    • D. 

      Fear

  • 8. 
    Which is not a human desire that cyber criminals exploit when using social engineering techniques?
    • A. 

      Anger

    • B. 

      Desire to help

    • C. 

      Curiosity

    • D. 

      Fear

  • 9. 
    Which is not a human desire that cyber criminals exploit when using social engineering techniques?
    • A. 

      Desire to avoid conflict

    • B. 

      Desperation

    • C. 

      Fear

    • D. 

      Curiosity

  • 10. 
    Which of the following is recommended as part of a secure password?
    • A. 

      Special Character

    • B. 

      Phone Number

    • C. 

      Birthdate

    • D. 

      Vehicle Information

  • 11. 
    Which of the following is recommended as part of a secure password?
    • A. 

      Number

    • B. 

      Mothers Name

    • C. 

      Birthdate

    • D. 

      Vehicle Information

  • 12. 
    Which of the following is recommended as part of a secure password?
    • A. 

      Pet Name

    • B. 

      Birthdate

    • C. 

      Vehicle Information

    • D. 

      None of the Above

  • 13. 
    Which of the following is recommended as part of a secure password?
    • A. 

      Pet Name

    • B. 

      Capital Letter

    • C. 

      Birthdate

    • D. 

      Vehicle Information

  • 14. 
    A phishing attack typically asks you to do which of the following?
    • A. 

      Reply back via email

    • B. 

      Open an attachment

    • C. 

      Submit a ticket

    • D. 

      Call a number

  • 15. 
    A phishing attack typically asks you to do which of the following?
    • A. 

      Call a number

    • B. 

      Submit a ticket

    • C. 

      Reply back via email

    • D. 

      Provide information

  • 16. 
    A phishing attack typically asks you to do which of the following?
    • A. 

      Call a number

    • B. 

      Submit a ticket

    • C. 

      Update information

    • D. 

      Reply back via email

  • 17. 
    A phishing attack typically asks you to do which of the following?
    • A. 

      Click a link

    • B. 

      Call a number

    • C. 

      Submit a ticket

    • D. 

      Reply back via email

  • 18. 
    Which of the following will help to prevent sensitive information from being compromised? 
    • A. 

      Allow unauthorized individuals to use your computer or credentials

    • B. 

      Change your password immediately if you believe that it may have been compromised

    • C. 

      Discuss confidential work related information, such as accounting figures or contract details, in a public area

    • D. 

      Keep confidential information on your laptop

  • 19. 
    What is the best way to remember your password?
    • A. 

      Write it down

    • B. 

      Save it on your computer

    • C. 

      Use a passphrase and commit it to memory

    • D. 

      Save it on your phone

  • 20. 
    Which of the following will help to prevent sensitive information from being compromised?
    • A. 

      Validate a recipient as trusted and confirm their information before sending confidential information

    • B. 

      Allow unauthorized individuals to use your computer or credentials

    • C. 

      Discuss confidential work related information, such as accounting figures or contract details, in a public area

    • D. 

      Keep confidential information on your laptop

Back to Top Back to top
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.