2019 Security Awareness Training Assessment

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Rtaheri
R
Rtaheri
Community Contributor
Quizzes Created: 2 | Total Attempts: 540
| Attempts: 204 | Questions: 20
Please wait...
Question 1 / 20
0 %
0/100
Score 0/100
1. What is a phishing email?

Explanation

A phishing email is an email that is designed to deceive and trick the recipient into revealing their confidential information, such as passwords, credit card numbers, or social security numbers. The sender of the email pretends to be a trustworthy entity, such as a bank or a reputable company, in order to gain the recipient's trust and convince them to provide their sensitive information. This type of email is a common method used by cybercriminals to carry out identity theft and financial fraud.

Submit
Please wait...
About This Quiz
2019 Security Awareness Training Assessment - Quiz

The 2019 Security Awareness Training Assessment focuses on enhancing security protocols within Credly. It tests knowledge on phishing, password security, information classification, applicable laws, and internal security management.

2. What is an insider threat?

Explanation

The correct answer is the definition of an insider threat, which refers to a malicious threat that originates from individuals within an organization. These individuals, including employees, former employees, contractors, or business associates, possess insider knowledge about the organization's security practices, data, and computer systems. This type of threat can pose a significant risk to the organization's security and can lead to unauthorized access, data breaches, or other malicious activities.

Submit
3. What is the most important aspect of a Company's security program?

Explanation

The most important aspect of a company's security program is the company's employees. This is because employees are often the weakest link in a company's security system. They have access to sensitive information and systems, and can inadvertently or intentionally compromise security. Therefore, it is crucial for companies to educate and train their employees on security best practices, enforce strong password policies, and implement measures such as multi-factor authentication to ensure the security of their systems and data.

Submit
4. What is NOT a purpose of an Information Security Program

Explanation

not-available-via-ai

Submit
5. Which of the following is an acceptable password?

Explanation

The password "Fr33d0m89?" is an acceptable password because it meets the criteria for a strong password. It includes a combination of uppercase and lowercase letters, numbers, and special characters. The use of numbers and special characters adds complexity to the password, making it harder for hackers to guess or crack. Additionally, the password is at least 8 characters long, which is generally considered a minimum requirement for a secure password.

Submit
6. Which of the following security practices requires all Credly employees to take a screenshot when completed?

Explanation

not-available-via-ai

Submit
7. What is the first thing you should do when receiving a phishing email to your Credly email address?

Explanation

When receiving a phishing email to your Credly email address, the first thing you should do is forward the email to the Security Council. This is because the Security Council is responsible for handling security-related issues, including phishing attempts. By forwarding the email to them, you are alerting the appropriate team who can investigate and take necessary actions to mitigate the threat.

Submit
8. Which of the following statements about a password is TRUE?

Explanation

A password must be changed on a quarterly basis to ensure security. Regularly changing passwords helps to prevent unauthorized access to accounts or systems. By changing passwords every three months, it reduces the risk of passwords being compromised and provides an additional layer of protection.

Submit
9. Which of the following constitutes confidential information? Select all that apply

Explanation

The correct answer is that confidential information includes documents or other information that are marked confidential, documents or other information that you reasonably believe to be confidential, and documents or other information that you are told are confidential. This means that any information or documents that are explicitly labeled as confidential, any information or documents that you have a reasonable belief are confidential, and any information or documents that someone explicitly tells you are confidential are considered confidential information.

Submit
10. Which of the following security laws do NOT apply to Credly?

Explanation

The Health Insurance Portability and Accountability Act (HIPPA) does not apply to Credly. HIPPA is a US law that ensures the privacy and security of health information. However, Credly is a digital credentialing platform and does not deal with health information. Therefore, HIPPA does not apply to Credly.

Submit
11. Which of the following is true about sensitive information?

Explanation

Credly employees must follow the "minimum necessary" rule for disclosing sensitive information means that employees should only access and disclose sensitive information when it is necessary for their job responsibilities. This ensures that sensitive information is protected and only accessed by authorized individuals who need it to perform their duties.

Submit
12. Who manages the Credly security program?

Explanation

The Security Council manages the Credly security program.

Submit
13. What are appropriate networks you can use when doing Credly work? (Select all that apply)

Explanation

Appropriate networks that can be used when doing Credly work include your secure home WiFi and The WeWork WiFi. These networks are considered suitable because they are secure and provide a stable internet connection, ensuring the safety and reliability of the work being done on Credly. Public WiFi and your friend's WiFi network may not be as secure or stable, making them less appropriate for Credly work.

Submit
14. What is piggybacking?

Explanation

not-available-via-ai

Submit
15. What are the Credly Information Classification categories?

Explanation

The Credly Information Classification categories include Confidential Information, Sensitive Information, and Public Information. These categories help classify and protect different types of information based on their level of sensitivity and importance. Confidential Information refers to data that should only be accessed by authorized individuals, while Sensitive Information includes data that requires special handling and protection. Public Information is data that can be freely accessed and shared by anyone.

Submit
16. What policy governs emergencies at Credly?

Explanation

The Business Continuity Plan governs emergencies at Credly. This plan outlines the procedures and protocols to be followed in the event of an emergency or disruption to normal business operations. It ensures that essential functions and services can continue to operate during and after an emergency, minimizing the impact on the organization. The Business Continuity Plan includes strategies for disaster recovery, communication, resource allocation, and coordination of response efforts.

Submit
17. What policy governs workspace security?

Explanation

The Clean Desk Policy is a policy that governs workspace security by requiring employees to keep their work areas clean and free of sensitive or confidential information. This policy helps prevent unauthorized access to sensitive data and reduces the risk of information theft or loss. By implementing the Clean Desk Policy, organizations can ensure that employees properly secure and protect sensitive information when they are not at their desks, promoting a culture of security awareness and accountability.

Submit
18. What is the greatest security threat to Credly?

Explanation

An accident triggered by a non-malicious workforce member can be the greatest security threat to Credly because it is difficult to anticipate and prevent such incidents. While hackers from overseas and insider threats can pose significant risks, they are often intentional and can be detected and mitigated with proper security measures. On the other hand, accidents caused by non-malicious employees can lead to unintentional data breaches or system failures, potentially causing significant damage to Credly's security and operations. It is important for organizations to have robust training and protocols in place to minimize the risk of accidents caused by employees.

Submit
19. What is an example of information that is sensitive but NOT confidential?

Explanation

Badges that have been shared by Earners on social media websites can be considered sensitive information because they may reveal someone's skills, achievements, or affiliations. However, they are not confidential because they have been willingly shared by the Earners on public platforms.

Submit
20. Where should Earner Information be stored?

Explanation

Earner Information should be stored on the Amazon Web Services (AWS) production server. This is because AWS provides a secure and reliable platform for storing and managing sensitive data. Storing the information on a personal laptop or Google Drive may not provide the same level of security and accessibility as an AWS production server. Additionally, using both AWS and a personal laptop (option C) or using all three options (option D) would not be necessary if the AWS production server is already available.

Submit
View My Results

Quiz Review Timeline (Updated): Jan 30, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jan 30, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 05, 2019
    Quiz Created by
    Rtaheri
Cancel
  • All
    All (20)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What is a phishing email?
What is an insider threat?
What is the most important aspect of a Company's security program?
What is NOT a purpose of an Information Security Program
Which of the following is an acceptable password?
Which of the following security practices requires all Credly...
What is the first thing you should do when receiving a phishing email...
Which of the following statements about a password is TRUE?
Which of the following constitutes confidential information? Select...
Which of the following security laws do NOT apply to Credly?
Which of the following is true about sensitive information?
Who manages the Credly security program?
What are appropriate networks you can use when doing Credly work?...
What is piggybacking?
What are the Credly Information Classification categories?
What policy governs emergencies at Credly?
What policy governs workspace security?
What is the greatest security threat to Credly?
What is an example of information that is sensitive but NOT...
Where should Earner Information be stored?
Alert!

Advertisement