TPA Stream Annual Security Training Review

An illustration of a secure office environment with employees practicing good security habits, including a clean desk, locked doors, and an anti-phishing awareness poster.

Annual Security Training Review Quiz

Welcome to the TPA Stream Annual Security Training Review Quiz! This engaging quiz aims to assess your understanding of key security practices and policies within our organization.

Test your knowledge on:

  • Email security
  • Clean Desk Policy
  • Phishing attacks and prevention
  • Proper handling of sensitive information
10 Questions2 MinutesCreated by SecureGuard202
Email:
What does the Clean Desk Policy pertain to?
Home screen is empty, browser windows closed, console not on screen
Lysol and Clorox everything
Only have the essentials needed to work on your desk
Laptops and work stations logged off when not in use, or turned off and stored away. No paper records on table
What does the Last One Out rule refer to?
You're a rotten egg if you are the last one out
Lock the office door if you are the last one or only person in the office
If you reported the security threat, it is your responsibility to follow up on the incident as the last one out.
What are different types of phishing attacks?
Destructive, controlled, and segmented phishing
Pharming, deceptive and spear
Jigging, trolling and bobber
Remote, specific, tracker
There are two particular methods of sensitive information recording we do not allow. They are:
You need to report a security threat to a member of the SIRT team. Who is on this team?
What is Deceptive Phishing?
When a hacker scams a user by posing as a legitimate site in order to collect information that could be valuable or sensitive
A hacker changes IP address associated with the website. This redirects the user to a malicious website, despite entering a correct domain name in the URL
A Nigerian prince wants to send you $5,000,000 right now if you wire them $5,000 to fix their yacht.
What can we do to prevent phishing attacks?
A customer sends you an email containing PHI. How should you respond to the email?
A customer would like you to share a participant's username and password with them. What's the move?
Provide it to them over the phone
Provide it to them through email
Explain that we do not provide this information
Send Eric an email
{"name":"TPA Stream Annual Security Training Review", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Welcome to the TPA Stream Annual Security Training Review Quiz! This engaging quiz aims to assess your understanding of key security practices and policies within our organization.Test your knowledge on:Email securityClean Desk PolicyPhishing attacks and preventionProper handling of sensitive information","img":"https:/images/course1.png"}
Powered by: Quiz Maker