Cyber Hygiene
IT Support
Hacked
True or False
Statistics
100

What is the most important security awareness training topic?

  • Physical security
  • Types of malware
  • Social engineering
  • Remote security
  • All of the above

All of the Above

100

What is an IP address?

A. A website
B. A password
C. A Wi-Fi name
D. The unique identifying number assigned to every device connected to the internet


D. The unique identifying number assigned to every device connected to the internet

100

What is the most common reasons peoples' information gets hacked?

A. Hackers are too good
B. Left webcam on
C. Compromised/weak passwords
D. Sharing information with friends

C. Compromised/weak passwords

100

You should try to use the same password across multiple accounts so they are easier to remember for you.

A. True
B. False

B. False

100

How many people get hacked a year?

A. 500
B. 1,000,000
C. 800,000
D. None

C. 800,000

200

What does BYOD stand for in an IT Environment?

Bring Your Own Device

200

What is the first thing you should do when your hardware isn't working?

A. Check the cables
B. Call IT Support
C. Turn it off and on
D. Buy a new PC

A. Check the cables

200

What is considered an Insider Threat?

A. A hacker stealing information
B. An employee/contractor using access to do harm
C. Employees unlocking the door to a business
D. Santa Clause giving gifts

B. An employee/contractor using access to do harm

200

"PII" stands for Personal Identifiable Information?

A. True
B. False

A. True

200

How many  Americans on average reuse a password for the same accounts?

A. 90%
B. 30%
C. 13%
D. 2%

C. 13%

300

How many characters in a password is considered a strong password?

A. 8
B. 24
C. 12
D. 16

C. 12

300

How often must your password be changed?

A. Once a week
B. Every 3 months
C. Once a year
D. Only after being hacked

B. Every 3 months

300

What is considered a "Backdoor Vulnerability"?

A.  Cybercriminals hid malware inside of a free file converter
B. Leaving the physical backdoor open
C. Leaving the front door open
D. Giving access to software to everyone

A.  Cybercriminals hid malware inside of a free file converter

300

Misspelling of words is considered a sign of phishing emails.

A. True
B. False

A. True

300

According to the US Bureau of Labor Statistics, cybersecurity employment for positions like information security analysts is predicted to grow ____ percent by 2031.


A. 85%
B. 35%
C. 65%
D. 1%

B. 35%

400

Before inserting your USB to install/download software, it's good practice to do what?

A. Grab a drink first
B. Check to see if software is trusted
C. Confirm your identity
D. Create a password for your USB

B. Check to see if software is trusted

400

Should you leave remote desktop access enabled at all times?

A. No
B. Yes


A. No

400

What is ethical hacking?

A. Authorized attempt to gain access
B. Unauthorized attempt to gain access
C. DDOS'ing someone on Call of Duty
D. Hacking but for fun

A. Authorized attempt to gain access

400

You should always wait a year before installing a new update on your computer or cell phone in case it's buggy.

A. True
B. False

A. False

400

Which is the highest salary jobs in USA for IT?

A. Software Engineer (Staff – Senior Levels)
B. Product Designer
C. Data Scientist
D. Site Reliability

A. Software Engineer (Staff – Senior Levels) - $132k to $210k

- Note - These are all real careers with real salaries.

500

What is considered malicious malware?

A. Anything free to install that enhances your computer performance
B. Computer viruses, worms, Trojan horses, ransomware and spyware.
C. Software to monitor a network to promote your skills
D. Software that provides hacking tools

B. Computer viruses, worms, Trojan horses, ransomware and spyware.

500

If you are unable to access your account, you should first do what?

A. Call IT Support
B. Check to make sure CAPS Lock is turned off
C. Reset Password
D. Find something else to do

B. Check to make sure CAPS Lock is turned off

500

Who is the world's most famous hacker?

A. Lebron James
B. Kevin Mitnick
C. John Doe
D. John Young

B. Kevin Mitnick
- Kevin Mitnick is a well-known computer hacker and cybersecurity consultant who gained notoriety during the 1990s for his hacking activities. 

500

VPN stands for Virtually Public Network.

A. True
B. False

A. False

500

What is the most popular IT Company?

A. Cisco
B. Microsoft
C. X (Twitter)
D. Facebook

B. Microsoft

- Note - According to the overall statistics, Microsoft is the top IT company in the world due to its wide range of products, services, and customer base. 

M
e
n
u