Advertisement
Advertisement
Advertisement

Information Security Quizzes & Trivia

So much of our life today is conducted over the Internet. We communicate online. We shop online. We even pay our bills online. We give the most personal information, such as social security, bank account, and credit card numbers, to our computer systems. How do we know this information is safe? Well, that depends on how good our information security is.
 
Information security protects our information from unauthorized access. This also applies to information not given over the Internet, such as good old-fashioned paper bills and statements. But, how much are those used anymore? Regardless, all of this information must be protected. Do you understand how? See how much trust you give to others who have access to your information with these quizzes on information security. 
Top Trending



Questions: 20  |  Attempts: 4313   |  Last updated: Apr 6, 2020
  • Sample Question
    Why is it important to have a good understanding of Information Security policies and procedures? 

Please take this quiz individually. This will help with both gauging knowledge in core Information Security principles and also acting as an interactive educational tool. This is a 20 question quiz. Each question is worth 5...

Questions: 20  |  Attempts: 2492   |  Last updated: Feb 23, 2018
  • Sample Question
    What is SSL also referred to as in web browsers?



Questions: 51  |  Attempts: 1456   |  Last updated: Sep 7, 2020
  • Sample Question
    Another name for the information security triad is:



Questions: 6  |  Attempts: 2245   |  Last updated: Mar 2, 2016
  • Sample Question
    Which action below would breach the Clear Desk and Screen Policy?

This Policy has been created to mitigate the multiple risks that the organisation faces by handling data and using technical equipment. Please complete the following set of questions to demonstrate you have an understanding of...

Questions: 20  |  Attempts: 924   |  Last updated: Oct 23, 2020
  • Sample Question
    If you are going to be using personal equipment in the organisation what should you do? (Select all that apply)
Advertisement

Advertisement

Information Security Questions & Answers


What kind of life experiences might not turn a trusted user into a malicious insider?
The promotion would not turn a trusted user into a malicious insider. • People who are promoted to their job feel appreciated. • It feels like they have a purpose within the company, and they are recognized for their hard work. • Th
What is the biggest threat to computer information security?
When you access your computer, you may enter data that is very important information. When you enter your social security number or credit card number into the system, you must trust the computer system. Many website and computers offer security to m
What kind of actions would breach the Clear Desk and Screen Policy in IT?
Are you familiar with this policy? This instructs the employees to make sure that all of their computers are locked especially when they have to leave their desks for a certain period of time. There is always a possibility that there will be prying e
Can you complete the sentence?The first step in Security Awareness is being able to ________ a security threat.
The correct answer to this question is B. The first step in Security Awareness is being able to recognize a security threat. This can be done by making users aware of what a threat looks like, communicating regularly with all levels of the organizati
More More information security Questions