General Security
Physical Security
Cybersecurity
Password Security
Mobile Security
100

True or False: Sharing your password with a colleague is acceptable if they need access to a file urgently.

False

100

How should you dispose of confidential documents?

Shredding is the most secure method

100

What is a common tactic used in social engineering attacks?

Creating a sense of urgency or impersonating a trusted source to trick someone into revealing information

100

What are the characteristics of a strong password?

Long, complex, includes a mix of uppercase and lowercase letters, numbers, and symbols

100

Why is it important to use a strong PIN or password to lock your work mobile device?

Protects sensitive information in case of loss or theft

200

What type of information should you never include in a work email?

Social Security numbers, credit card details, confidential company data

200

What should you do if you find a stranger tailgating (following closely behind) you into a secure building access point?

Report it to security or politely refuse to hold the door open

200

How can you identify a suspicious website?

Look for misspellings in the URL, lack of a security certificate, unusual pop-up messages

200

How often should you change your work password?

According to company policy, but generally every few months

200

What should you do if you lose your work phone?

Report it to IT security immediately and change your passwords

300

What is the first thing you should do if you suspect a phishing email?

Do not click on any links or attachments, report it to IT security

300

Why is it important to keep your desk and workspace clear of sensitive documents?

Reduces risk of accidental exposure or unauthorized access

300

What should you do if you click on a malicious link in a work email?

Immediately disconnect your device from the network and report it to IT security

300

What should you never do with your work password?

Write it down, share it with anyone, use it for personal accounts

300

Should you download apps for work purposes from unauthorized app stores?

No, only download apps from trusted sources approved by your company

M
e
n
u