Information Security Training Quiz! Trivia

  • ISO/IEC 27001
  • NIST SP 800-53
Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Jfey2006
J
Jfey2006
Community Contributor
Quizzes Created: 1 | Total Attempts: 187
| Attempts: 187 | Questions: 10
Please wait...
Question 1 / 10
0 %
0/100
Score 0/100
1. If a suspicious email is forwarded to you the best thing to do is notify IT Support and not forward the email to anyone as it could contain a virus or malicious code that could harm other PCs or the network itself.

Explanation

True, whenever in doubt always notify IT support, they armed with the tools to look at the email and see what types of threats could be embedded within.

Submit
Please wait...
About This Quiz
Information Security Training Quiz! Trivia - Quiz

Welcome to the Information Security Training Quiz! Specific rules and procedures are put in place when using computer artwork, and it is essential for employees to know what they have access to and don’t. How do you ensure that the password you have set for your computer is safe, and... see moredo you know how to note suspicious emails sent to you? This quiz will help find out how secure your information is. see less

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. Individually Identifiable Information includes things like Name, Date of Birth, Phone Number, E-Mail Address, Health Information, and Social Security Number.

Explanation

True, our customer's information is one of our most valuable assets!

Submit
3. Spear Phishing is when identity thieves craft a sophisticated phishing email that appears to come from your employer, typically someone in HR or the IT departments.

Explanation

True, this technique is more widely used than ever before.

Submit
4. HIPAA infractions can include not only financial penalties on the corporation but on the individual involved as well. If the violation was wrongful or negligent disclosure, the individual can also face jail time.

Explanation

True, HIPAA violations can even mean jail time in some cases.

Submit
5. Identity thieves deploy various techniques to try and steal customer information including but not limited too: phishing, social engineering, and network attacks.

Explanation

True, other techniques include dumpster diving, theft, and network attacks.

Submit
6. Phishing is a special way of catching fish in Philadelphia.

Explanation

False, phishing is a technique used by identity thieves where they send out emails requesting information on potential targets in hopes that company personnel will provide it.

Submit
7. Social Engineering is an easy way for identity thieves to try and extract information from the company's front line personnel.

Explanation

True, the easiest way to get information...is to ask!

Submit
8. Strong Passwords have 6 characters, one number, and one capital letter.

Explanation

False, strong passwords have 8 characters and at least 1 upper case letter, 1 lower case letter, 1 number, and 1 special character. In addition, they are not a dictionary word or a formal name.

Submit
9. Some of the tools companies use to protect their organizations from identity thieves include things like firewalls, shred bins, monitor shades, and policies and procedures; but does not include annual training like this test.

Explanation

False, annual information security training is a critical part of any information security program.

Submit
10. The most valuable tools against identity thieves are firewalls.

Explanation

False, the most valuable tool against identity thieves is a well trained and alert staff.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 20, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 08, 2010
    Quiz Created by
    Jfey2006
Cancel
  • All
    All (10)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
If a suspicious email is forwarded to you the best thing to do is...
Individually Identifiable Information includes things like Name, Date...
Spear Phishing is when identity thieves craft a sophisticated phishing...
HIPAA infractions can include not only financial penalties on the...
Identity thieves deploy various techniques to try and steal customer...
Phishing is a special way of catching fish in Philadelphia.
Social Engineering is an easy way for identity thieves to try and...
Strong Passwords have 6 characters, one number, and one capital...
Some of the tools companies use to protect their organizations from...
The most valuable tools against identity thieves are firewalls.
Alert!

Advertisement