Have you ever heard about the term "Whispir"? Are you ready for a Whispir information security awareness quiz? Whispir aligns its security incident response processes to NIST guidelines for the purpose of incident handling. Its security team has a combination of best-of-breed security tooling as well as clear incident triaging criteria. Apart from that incident, playbooks are there to effectively handle a response to a security incident. So, let's see what more you know! All the best to you!
Open the attachment to view its contents.
Delete the email
Forward the email to your co-workers to allow them to open the attachment first
Forward the email to your personal email account so you can open it at home
Rate this question:
Forward it to co-workers for a good laugh
Send it to a client that is also a good friend.
Post it on SharePoint
None of the above
Rate this question:
Spyware or Adware installation
Browser Hijacking
Information or identity theft
All of the above
Rate this question:
Helps protect individuals from being victims of security incidents.
Provides an understanding of steps to follow in the event of a security incident
Helps to understand levels of responsibility
All of the above
Rate this question:
Someplace easily seen from your computer.
Someplace that is out of sight, like beneath your keyboard or in a nearby drawer.
Wherever you really need it for your memory, this information can only be kept in a secure location.
You should never write down your password.
Rate this question:
True
False
Rate this question:
HOTS
Phone
Any of the above
None of the above
Rate this question:
Delete an unexpected or unsolicited message
Use anti-virus software to scan attachments before opening.
Delete similar messages that appear more than once in your Inbox
All the above
Rate this question:
Information and Paper assets
Physical and Application assets
Service Assets
Options A, B, C
Options A and B Only
Rate this question:
By maintaining documents/code in configuration management system
By following coding guidelines
By doing reviews and testing
Options A and B
All the above
Rate this question:
Confidentiality, Integration, and Availability
Continuity, Integration, and Availability
Confidentiality, Integrity, and Accessibility
Continuity, Integrity, and Accessibility
Confidentiality, Integrity, and Availability
Rate this question:
Give him/her the WiFi code and grant them access.
Confirm that the visitor's system is protected by Antivirus and then grant them access to the WiFi network
Apologize and explain that this access is ONLY for privileged visitors
All of the above
Rate this question:
With CEO
Network folder
Intranet website
With employees
Rate this question:
Frustration with co-workers
Stress
Promotion
Financial problems
Rate this question:
Quiz Review Timeline (Updated): Aug 31, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Information Security Awareness Training Quiz
Information security awareness is a relatively new and evolving part of information security which focus more on raising consciousness regarding potential risks of the rapidly...
Questions:
10 |
Attempts:
2878 |
Last updated:
Mar 22, 2023
|
Revision Topic 1: Introduction To Security
This quiz covers basic concepts of information security, including protection measures, threats, vulnerabilities, and relevant technologies.
Questions:
20 |
Attempts:
255 |
Last updated:
Mar 21, 2023
|
Risk Management Framework Questions!
Explore the Risk Management Framework through targeted questions! Assess your understanding of security assessment, system authorization, and the roles involved in the RMF...
Questions:
30 |
Attempts:
672 |
Last updated:
Nov 16, 2023
|
Mobile Device Security Quiz
The Mobile Device Security Quiz assesses knowledge on safe practices for mobile devices, including secure use of public Wi-Fi, timely updates, and proper handling of corporate...
Questions:
5 |
Attempts:
394 |
Last updated:
Mar 21, 2023
|
SY0-501 - Chapter 1 Mastering Security Basics
The SY0-501 - Chapter 1 Mastering Security Basics quiz assesses key security concepts and practices for deploying applications, preventing equipment theft, maintaining...
Questions:
15 |
Attempts:
321 |
Last updated:
Mar 21, 2023
|
Computer Hardware And Software Startup Functions
Explore key concepts in computer security through a quiz on malware, virus types, and ransomware. Assess your understanding of system protection, identify security breaches, and...
Questions:
10 |
Attempts:
209 |
Last updated:
Mar 20, 2023
|
Wait!
Here's an interesting quiz for you.