Information Security Quiz 01

Create an image illustrating a person sitting at a computer, surrounded by digital security symbols like locks, shields, and phishing hooks, showcasing the importance of information security awareness.

Master Your Information Security Knowledge

Test your understanding of information security in this engaging quiz designed for all users! From recognizing phishing attempts to creating strong passwords, this quiz covers essential topics that help safeguard your personal and professional information.

Whether you are a beginner or looking to brush up on your skills, you'll benefit from:

  • Real-world scenarios
  • Helpful tips and guidelines
  • An opportunity to learn while assessing your knowledge
11 Questions3 MinutesCreated by ProtectingPassword42
1. Why is it important that a user never open an email from someone they don't know?
A. It will play music
B. It will surprise them
C. It may contain a virus
D. It is a way to ignore people
2.Tharindu recently received an e-mail message that appears to come from a legitimate enterprise and ask him to login using his CDB username and password. Above types of attack are called,
A. Pharming
B. Phishing
C. Spoofing
D. Social engineering
3.If you're not careful during Internet browsing, what can happen?
A. Spyware or Adware installation
B. Browser Hijacking
C. Information or identity theft
D. All of the above
4.Nisha has received an email attachment along with a link from an unknown recipient to her office mail account saying that she has won a ticket to travel Paris on this summer. However, she has not involved in any attempts to receive anything like above. What should Nisha do, next?
A. Should consider opening the mail since it came to his office mail account
B. Should open the mail as she heard that the company has filtered content through the firewall
C. Should not open the attachment and only visit the link and see what is there due to security purposes
D.Should not open the mail since it is not work-related and immediately report this to Information Security Response Team
5. When leaving for lunch or to take a break, which is the best way to secure your computer?
A. Turn off the machine and leave
B. Hide the confidential documents stored in the PC
C. Ask someone to watch out your PC
D. Lock your workstation pressing Windows Key +L
6. Why is it necessary for everyone to have a good understanding of Information Security policies and procedures?
A. It helps protect users from being victims of security incidents
B. It provides an understanding of pattern to follow in a security incident.
C. It helps to understand levels of responsibility
D. All of the above
7. Passwords are important for preventing unauthorized access to information. Which of the following is strong passwords according to the CDB Information Security Policy?
A. $jelF2bb
B. %4Btv
C. Rooney
D. secret22
8. Who is responsible for information security at CDB?
A. IT Services
B. IS Officer
C. Senior Managers and Team Leaders
D. Employees
9. Is the following statement true or false? Reusing the same password across multiple sites is a good idea. It's very convenient after all
True
False
10. What is the weakest link in an information security?
A. Systems
B. Human
C. Processes
D. Technology
{"name":"Information Security Quiz 01", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your understanding of information security in this engaging quiz designed for all users! From recognizing phishing attempts to creating strong passwords, this quiz covers essential topics that help safeguard your personal and professional information.Whether you are a beginner or looking to brush up on your skills, you'll benefit from:Real-world scenariosHelpful tips and guidelinesAn opportunity to learn while assessing your knowledge","img":"https:/images/course7.png"}
Powered by: Quiz Maker