Cybersecurity Training Assessment of Learning Outcomes
Name (First and Last)
Select Your Campus/Department
Which of the following is a suspicious email?
An unexpected message from an International Prince indicating that he would like to share his inheritance with me.
An email from a bank that I haven’t used in years, but they claim they need my account information to process a transaction.
An email from a Russian beauty queen, who is looking for my assistance in finding an American husband.
A threatening communication from the IRS indicating that my taxes are overdue and will be pressing charges if I don’t log in a provide my information.
All of the above.
Which of the following can cybercriminals use to gain access to confidential information?
All of the Above
Personal laptops, mobile devices, and desktops that connect to the SISD network are subject to Springtown ISD IT monitoring, security, and management standards.
It is acceptable to share passwords with IT staff or other trusted individuals.
Mobile computing devices are generally not secure and inherently at risk for data loss. As such, Springtown ISD ___________________ information should not be stored on a mobile computing device.
Confidential or sensitive
All of the above
Emails in my inbox and files I have created and stored on district-owned/provided information resources are my personal property.
It is the responsibility of Springtown ISD to safeguard and secure student’s personal information, and as an employee of the district, I share in this responsibility.
A virus is software/application that securely manages my data.
Never submit passwords through Google Forms.
This form was created inside of Springtown ISD.