Information Security Training Quiz! Trivia

10 Questions | Total Attempts: 96

SettingsSettingsSettings
Please wait...
Information Security Training Quiz! Trivia

Welcome to the Information Security Training Quiz! Specific rules and procedures are put in place when using computer artwork, and it is essential for employees to know what they have access to and don’t. How do you ensure that the password you have set for your computer is safe, and do you know how to note suspicious emails sent to you? This quiz will help find out how secure your information is.


Questions and Answers
  • 1. 
    Individually Identifiable Information includes things like Name, Date of Birth, Phone Number, E-Mail Address, Health Information, and Social Security Number.
    • A. 

      True

    • B. 

      False

  • 2. 
    HIPAA infractions can include not only financial penalties on the corporation but on the individual involved as well. If the violation was wrongful or negligent disclosure, the individual can also face jail time.
    • A. 

      True

    • B. 

      False

  • 3. 
    Identity thieves deploy various techniques to try and steal customer information including but not limited too: phishing, social engineering, and network attacks.
    • A. 

      True

    • B. 

      False

  • 4. 
    Phishing is a special way of catching fish in Philadelphia.
    • A. 

      True

    • B. 

      False

  • 5. 
    Spear Phishing is when identity thieves craft a sophisticated phishing email that appears to come from your employer, typically someone in HR or the IT departments.
    • A. 

      True

    • B. 

      False

  • 6. 
    Social Engineering is an easy way for identity thieves to try and extract information from the company's front line personnel.
    • A. 

      True

    • B. 

      False

  • 7. 
    Some of the tools companies use to protect their organizations from identity thieves include things like firewalls, shred bins, monitor shades, and policies and procedures; but does not include annual training like this test.
    • A. 

      True

    • B. 

      False

  • 8. 
    The most valuable tools against identity thieves are firewalls.
    • A. 

      True

    • B. 

      False

  • 9. 
    Strong Passwords have 6 characters, one number, and one capital letter.
    • A. 

      True

    • B. 

      False

  • 10. 
    If a suspicious email is forwarded to you the best thing to do is notify IT Support and not forward the email to anyone as it could contain a virus or malicious code that could harm other PCs or the network itself.
    • A. 

      True

    • B. 

      False

Back to Top Back to top