2018 Security Awareness Compliance Training Assessment

20 Questions | Total Attempts: 159

SettingsSettingsSettings
2018 Security Awareness Compliance Training Assessment - Quiz

Instructions: 1- Finish the questions in this assessment before 12 PM (noon) on August 13, 2018. 2- You must answer 85% of the questions correctly (17/20). 3- After you complete the assessment, a certificate will appear on your screen showing your score. Take a screenshot of the certificate and send the certificate to Ramtin Taheri ([email protected] Com).


Questions and Answers
  • 1. 
    Which one of the following is an example of phishing?
    • A. 

      An email warning the recipient of a computer virus threat.

    • B. 

      An email directing the recipient to forward the email to friends.

    • C. 

      An email directing the recipient to enter personal details on a fake website made to look legitimate.

    • D. 

      An email from your manager about an upcoming meeting.

  • 2. 
    Which of the following is an acceptable password?
  • 3. 
    Where can the Credly Written Information Security Policy be found?
    • A. 

      Www.credly.com

    • B. 

      Www.youracclaim.com

    • C. 

      Intranet.credly.com

    • D. 

      Credly’s AWS (Amazon Web Services) account

  • 4. 
    Which of the following are possible warning signs of a potential insider threat situation? Select all that apply.
    • A. 

      A coworker is attempting to copy company proprietary data without being authorized to do so.

    • B. 

      A coworker is downloading a large amount of company information.

    • C. 

      Overhearing a coworker constantly expressing their dissatisfaction with working at Credly, and their desire to take adverse actions due to that dissatisfaction.

    • D. 

      Overhearing a coworker discuss working for a competitor of Credly.

  • 5. 
    You print a series of documents containing sensitive information for a client meeting. After the meeting is finished, what is the proper way to dispose of these documents?
    • A. 

      Place the documents in the recycling bin.

    • B. 

      Take the documents home and put them in your personal trash can.

    • C. 

      Shred the documents.

    • D. 

      Put the documents in the trash can at the office.

  • 6. 
    Which is not an acceptable method for locking a workstation?
    • A. 

      Press Windows Key + L

    • B. 

      Type LOCK on your keyboard, then press enter

    • C. 

      Press Command + Option + Power

    • D. 

      Press Command + Option + Eject

  • 7. 
    What should you do AS SOON AS you discover that a Security Incident occurred (or you have reason to believe one might have)?
    • A. 

      Fix the problem on your own.

    • B. 

      Notify a member of the Security Council.

    • C. 

      Inform local and national media outlets.

    • D. 

      Contact the hackers or entities that performed the attack.

  • 8. 
    How frequently must you change your password?
    • A. 

      Every 30 days.

    • B. 

      Every 90 days.

    • C. 

      Once Per Year.

    • D. 

      Passwords need not be changed if they are automatically generated by a password manager such as “LastPass.”

  • 9. 
    What is NOT considered sensitive information under the Credly Written Information Security Policy?
    • A. 

      An earner’s profile information.

    • B. 

      A proposal sent to a client.

    • C. 

      Your social media posts.

    • D. 

      A document describing a client’s credential issuing strategy.

  • 10. 
    Which of the following should you report to a member of the Security Council?
    • A. 

      Theft of your company issued laptop.

    • B. 

      Intentionally clicking a link in a phishing email.

    • C. 

      Accidentally sending sensitive client information to the wrong person.

    • D. 

      All of the above.

  • 11. 
    Which of the following security practices requires all Credly employees to take a screenshot when completed?
    • A. 

      Locking your screen when stepping away from the computer.

    • B. 

      Securely handling sensitive information.

    • C. 

      Reporting security incidents.

    • D. 

      Installing antivirus software.

  • 12. 
    When may you download and store Credly sensitive information on your local computer?
    • A. 

      When the information is encrypted.

    • B. 

      When the information is password protected.

    • C. 

      When the password is in a hidden folder.

    • D. 

      Never.

  • 13. 
    How does a Credly employee determine if information is confidential? Choose the best answer.
    • A. 

      The information is marked confidential AND a reasonable person would consider it to be confidential.

    • B. 

      The information is marked confidential.

    • C. 

      The information is marked confidential OR a reasonable person would consider it to be confidential.

    • D. 

      A reasonable person would consider the information to be confidential.

  • 14. 
    Which three positions make up the Company’s Security Council?
    • A. 

      Chief Privacy Officer, Chief Security Officer, General Counsel

    • B. 

      Chief Security Officer, Chief Privacy Officer, Chief Operating Officer

    • C. 

      Chief Privacy Officer, Chief Security Officer, Software Development Manager

    • D. 

      Vice President Product, General Counsel, Senior Legal Counsel

  • 15. 
    Which one of the following statements about a password is TRUE?
    • A. 

      It must be changed only if it is compromised.

    • B. 

      It cannot contain special character symbols.

    • C. 

      It must be registered with the system administrator.

    • D. 

      It must be changed on a quarterly basis.

  • 16. 
    Which of the following statements is TRUE?
    • A. 

      A document must be marked as “confidential” to be treated as confidential under the Credly Written Information Security Policy.

    • B. 

      The Credly Written Information Security Policy only applies to information that has never been disclosed to the public.

    • C. 

      The Credly Written Information Security Policy covers non-confidential information belonging to Credly’s clients.

    • D. 

      The Credly Written Information Security Policy only applies to employees who use earner profile Information.

  • 17. 
    Sending email via Credly’s Gmail system means that the email is encrypted in transit.
    • A. 

      True

    • B. 

      False

  • 18. 
    Which one of the following statements about wireless networks is TRUE?
    • A. 

      They cannot be intercepted by unknown users.

    • B. 

      They limit accessibility to other users.

    • C. 

      They limit visibility to other users.

    • D. 

      They can be accessible to other users.

  • 19. 
    It is ok to use a product that processes the personally identifiable data of Credly employees or users if: 
    • A. 

      My manager says it is ok.

    • B. 

      A member of the Security Council says it is ok.

    • C. 

      It has been posted at Credly.com/Subprocessors for at least 30 days.

    • D. 

      The product is in wide use or generally well-known.

  • 20. 
    Which of the following laws govern Credly’s treatment of personally identifiable data? 
    • A. 

      European Union General Data Protection Regulation (GDPR)

    • B. 

      The California Consumer Privacy Act of 2018

    • C. 

      The Children’s Online Privacy Protection Act (COPPA)

    • D. 

      All of the Above

Back to Top Back to top