Cybersecurity Awareness Quiz Welcome to the Cybersecurity Awareness Quiz Name Company Email Address 1. Social engineering in the context of cybersecurity is when someone uses deception to gain sensitive information? False True 2. Which one of these is NOT an example of protecting your workspace security? Having a crosscut shredder beside your desk Writing your login information on a post-it near your computer Locking your desktop screen with WIN+L before your step away Placing confidential documents in locked drawers 3. Which one of these is considered good practice for home wireless security? (Select 2) Hiding the Wireless SSID Letting unlimited devices connect to your wireless hotspot (if enabled) Setting a strong password Enabling WEP security 4. Ransomware is an example of what? An authorized app from the appstore Malware A fee for using a work application A useful tool for businesses 5. You suspect a data breach, what is a recommended course of action? Ignore your suspicions and don't take any action. Add a note in your calendar to further research it when you have time. Google possible responses to personal data breaches Open your companies incident response plan or contact the IS dept 6. Identity theft involves misuse of which of the following pieces of data? [Select all that apply] Name Address Date of Birth Medical information Drivers License no 7. Which one of these is a common form of attack on video conferencing facilities? A fake 'lookalike' link to a videconference meeting Ransomware attacks Man in the middle attacks VPN attacks 8. A kensington lock is a good method to secure what? Printer Laptop Crosscut Shredder Cellphone 9. Cybersecurity incidents can lead to company closure? True False 10. Which one of these is considered good security practice for mobile devices? (Select all that apply) Avoiding connecting to public wi-fi Turning on a backup service like iCloud or Google One Encrypting the devices SD-Card and SIM card Installing updates regularly on the phone Enabling find my device in case the device gets lost 11. Ransomware is often introduced by which of the following? Visiting reputable websites Logging in to social media sites Connecting via VPN to your work Clicking on email links 12. Cyberattacks can occur from other countries, thousands of miles away? True False 13. A message pops-up on your PC warning you that there is a problem with security software on your machine, what should you do? Notify the helpdesk immediately Close the pop-up box and hope that it clears automatically Troubleshoot the issue yourself Start uninstalling security software 14. Which one of these would be considered a strong password? R0bust_Cryp0gr@phy1! SamSmith1979 Pass12345 12cedarlane 15. Which one of these would be considered spoofing? An email from your managers manager An email with your bank manager's signature asking for your ATM PIN code A joke email doing the rounds at work An email with a spelling mistake 16. Which one of these is considered good login security? choose 2 Short passwords (less than 8 characters) Complex passwords with special characters and alphanumeric characters Enabling 2nd factor authentication Sharing passwords with work colleagues for convenience purposes 17. Cybersecurity is optional for most companies? True False 18. Phishing only occurs in email form? True False 19. You find a USB key on the ground in the parking lot near your workplace, what should you do? Plug it in to your work computer to see what's on it Plug it in at home out of curiosity Hand it in to your helpdesk / IS dept without seeing what's on it Ignore it as maybe another work colleague will discover it 20. Which one of these are main causes for data breaches?, Select 2 Not taking time to screen emails and clicking on links Sharing personal information improperly Ignoring company security policies Using weak / easily guessable passwords 1 out of 20 Time's up Paul2023-07-22T14:27:32-07:00 Share This Story, Choose Your Platform! FacebookTwitterLinkedInWhatsAppTelegramPinterestEmail About the Author: Paul