Security Awareness Training Quiz
Get your security posture score by answering the following questions.
Your colleague is emailing copies of confidential client presentation reports to his personal email address so he has an extra copy even if he loses the original one. Is he violating data privacy rules?
Your bank has emailed you asking you to send your credit card number and CVV number so they can add more loyal points to it. How quickly should you send them the details?
Within 24 hours
Within 48 hours
Which of the following reflect safe internet browsing practices? Check all relevant boxes.
Checking for "https:" in the URL when making payment transactions
Running antivirus updates regularly
Keeping record of your passwords in a Word doc for easy reference
Downloading gaming files from unknown websites
You believe you have received a phishing email. What should your next steps be? Check all relevant boxes.
Do not respond to the email request
Delete the email
Reply to the email saying that you know it is a scam
Report it to your manager and the IT team
Which of the following is a good password?
Phishing is a form of:
Making new friends
Social engineering fraud
Creating more revenue through clicks
All of the above
What is identity fraud?
Losing one’s identity (ID) card and making a duplicate copy of it
Forgetting to bring your company ID card to work and having to request a visitor's pass
Deliberate use of another person’s identify for financial gain or any other advantage
Changing one’s name by following all legal procedures
How do you clear confidential papers from your desk? Check all relevant boxes.
Dump them into the dustbin
Give them to an office assistant; they know best what to do with waste paper
Take it home and use it to make paper crafts
Shred it in the shredder
Confidential data is information that is not to be shared with persons other than those authorized to receive it. Which of the following do you think is confidential information? Check all relevant boxes.
Your company’s address and contact number
New patent document you are working on
Details of a business acquisition your organization is targeting
Personally identifiable employee records such as social security numbers
To build a culture of cybersecurity, you need to adhere to the following cybersecurity best practices. Check all relevant boxes.
Run software updates as soon as they are made available
Use antivirus software to scan for file downloads
Disable business accounts of ex-employees from the systems as soon as possible
Be vigilant when browsing online
This form was created inside of Software Advice.
Terms of Service