Cybersecurity Awareness Platform From Mitiget

A visually appealing illustration depicting cybersecurity concepts such as locks, firewalls, and phishing attacks in a vibrant and informative style.

Cybersecurity Awareness Quiz

Test your knowledge on cybersecurity with this engaging quiz designed to enhance your awareness and understanding of essential security practices. Whether you are a professional or just starting out, you'll find valuable information that can help protect you and your organization.

  • Learn about phishing attacks and their implications.
  • Understand the importance of strong passwords.
  • Discover best practices for information security.
22 Questions6 MinutesCreated by DefensiveMouse731
Email:
Email:
1. Which of the following four passwords is the most secure?
A. Boat123123
B. WTh!5Z@Lag#
C. into48brains
D. 1234561234
E. 23Jan1982
2. Who is responsible for information security in your organization?
A. The Cleaners
B. The Security Guards
C. The EXCO
D. Everyone in the organization
E. None of the above
3. What standard is good practice for Information security?
A. ISO 90001
B. ISO 27001
C. ISO 22301
D. ISO 31000
E. All of the above
4. Which of the following is an example of a “phishing” attack?
A. Sending someone an email that contains a malicious link that is disguised to look like an email from someone the person knows
B. Creating a fake website that looks nearly identical to a real website in order to trick users into entering their login information
C. Sending someone a text message that contains a malicious link that is disguised to look like a notification that the person has won a contest
D. Sending someone an email that contains a malicious link
D. All of the above
5. Criminals access someone’s computer and encrypt the user’s personal files and data. The user is unable to access this data unless they pay the criminals to decrypt the files. This practice is called …
A. Botnet
B. Ransomware
C. Driving
D. Spam
E. None of the above
6. If a public Wi-Fi network (such as in an airport or café) requires a password to access, is it generally safe to use that network for sensitive activities such as online banking?
A. Yes, it is safe
B. No, it is not safe
7. What does the “https://” at the beginning of a URL denote, as opposed to “http://” (without the “s”)?
A. That the site has special high definition
B. That information entered into the site is encrypted
C. That the site is the newest version available
D. That the site is not accessible to certain computers
E. None of the above
8. Why is it important to have a good understanding of Information Security policies and procedures?
A. Helps protect individuals from being victims of security incidents.
B. Provides an understanding of steps to follow in the event of a security incident
C. Helps to understand levels of responsibility
D. All of the above
9. What is the most common delivery method for viruses?
A. Email
B. Instant Message
C. Internet download
D. Portable media
10. Which of the following is a measure for preventing a social engineering attack except:
A. Do not give out computer or network information
B. Do not complete confidential company tasks in an unsecure setting
C. Do not secure sensitive documents and media
D. Do not give out personal identifiable information
11. If you're not careful about your Internet browsing, which of the following can result?
A. Spyware or Adware installation
B. Browser Hijacking
C. Information or identity theft
D. All of the above
12. What should you do if you think your password has been compromised?
A. Change your password
B. Report the incident to the proper authorities - such as a system administrator(s)
C. Check other systems that you have accounts on as they may be compromised as well
D. All the above
13. What should everyone know about information security? Check all that apply.
A. Computer security is part of everyone s job
B. Verify everything! Verify who the person is on the phone. Verify that the website is real. Verify that the visitor belongs where you find them
C. Report anything suspicious to your system administrator
D. Do not ignore unusual computer functioning. It might be a sign of malware.
E. All of the above
14. Who are you allowed to give your official password to?
A. Anybody you trust
B. Only supervisors and authorized IT staff
C. Only authorized IT staff
D. Nobody
15. Are you allowed to store sensitive company or personal information on a mobile device?
A. No, never
B. Yes, provided the information is limited to names and personal contact information
C. Yes, provided the device is password protected
D. Yes, provided the device is encrypted
16. True or False? A phishing attack can harm your personal computer only, but not your company’s network.
A. True
B. False
17. True or False? It is OK to use the same password for all your online accounts as long as you keep it a secret.
A. True
B. False
18. This is a document that states in writing how a company plans to protect the company's physical and IT assets.
A. Data Encryption Standard
B. Security policy
C. Public key certificate
D. Access control list
E. Copyright
19. This is a program or file that is specifically developed for the purpose of doing harm.
A. Security Program
B. Source code
C. Malware
D. Passphrase
E. Threat file
20. When a new mobile device is delivered to you for official use without configuration. What should you do?
A. Trust the manufacturer and leave the default settings
B. Change all the default setting settings and turn everything OFF
C. Change all the default setting settings and turn everything ON
D. Take the time to learn what each setting and feature mean for your device before acting.
{"name":"Cybersecurity Awareness Platform From Mitiget", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge on cybersecurity with this engaging quiz designed to enhance your awareness and understanding of essential security practices. Whether you are a professional or just starting out, you'll find valuable information that can help protect you and your organization.Learn about phishing attacks and their implications.Understand the importance of strong passwords.Discover best practices for information security.","img":"https:/images/course2.png"}
Powered by: Quiz Maker