Phishing
Internet Best Practices
Passwords
Physical Security
Free for All
100

Which is not a characteristic of a general phishing message?
a) highly personalized
b) easy to spot
c) sent to thousands at a time
d) opportunistic

a) highly personalized

100

Using a virtual private network, or VPN, will encrypt all transmissions from your device, making it more difficult for attackers to intercept. 

A.    True

B.    False


A.    True

100

A strong password is as lengthy as possible and includes uppercase letters, lowercase letters, numbers, and special characters.

A) True

B) False

A) True

100

Why should you maintain a clean and organized workspace?

A. Spot sensitive information you've left out

B. Detect if something goes missing

C. Prevent a fire hazard

D. All of these answers are correct

D. All of these answers are correct

100
What does SPAM stand for?

Stupid
Pointless
Annoying
Messages

200

How many employees must fall for a phish to compromise our organization?

1!

200

Which of the following should be avoided at work?

A. Peer-to-peer file sharing

B. Sites with adult content

C. Unknown URLs

D. All of these should be avoided

D. All of these should be avoided

200

A strong password is:

A) Random

B) Changing 

C) Unique

D) Complex

E) All of the above

E) All of the above

200

The two main functions of physical security are:

A. Detection and recovery

B. Deterrence and recovery

C. Deterrence and detection

D. Detection only

C. Deterrence and detection

200

Spear Phishing email are malicious emails designed to trick small groups or individuals into sharing information or allowing malicious code to run on their device.

    a. True

    b. False

a. True

300

Why are spam filters unlikely to stop a spear phishing attack?
a) They never contain malware
b) They're sent in small batches
c) They're sent in large batches

b) They're sent in small batches

300

Why do we recommend to avoid clicking on advertisements?

A. Ad networks can be corrupted with malicious links

B. Ads are annoying

C. Ads are usually safe to click on

D. Ads may be take you to a competitor’s website

A. Ad networks can be corrupted with malicious links

300

Which of the following is not part of our password policy?

A. Passwords must not be shared

B. Passwords must consist of at least ten (10) characters

C. Passwords must be changed every 90 days

D. All of above are part of our policy

D. All of above are part of our policy

300

What does physical security prevent?

A. Unauthorized physical access to a technical device

B. Cyber crime

C. Social engineering attacks

D. Viruses and spam

A. Unauthorized physical access to a technical device

300

_______ emails may attempt to solicit sensitive information or trick you in to visiting malicious sites or installing malware.

    a. Spam

    b. Phishing

    c. Marketing

    d. Social Networking

    b. Phishing

400

Spear phishers may seek the following information in a data entry attack:
a) Password
b) Credit card number
c) Data Entry attacks don't solicit information
d) Both password & credit card number

d) Both password & credit card number

400

Sensitive data should be stored:

A. Personal computer

B. Flash drive

C. On an encrypted drive

D. Unprotected file sharing site

C. On an encrypted drive

400

Which is an example of multi-factor authentication?

A. Single-use code sent to your cell phone

B. QR Code

C. Single-use code sent to your tablet

D. These are all examples of multi-factor authentication

D. These are all examples of multi-factor authentication

400

Which is not a target for physical theft?

A. Online network

B. Laptop/personal computer

C. Mobile/touch devices

D. Confidential documents

A. Online network

400

Which is not correct about software updates?

A. They are a popular lure in phishing scams

B. They can remove security flaws

C. They are safe to download from an email attachment

D. They can improve the user experience

C. They are safe to download from an email attachment

500

An indicator of a phishing email:

    a. All listed

    b. comes from an unknown sender

    c. urges you to click a link?

    d. appeals to your curiosity

 a. All listed

500

If you do this on a mobile device, you will be able to see the destination URL.

A. Press and hold

B. Double tap

C. Slide to the left

D. Zoom in

A. Press and hold

500

How can you prevent malware from being used to steal your password?

A. Be wary of links or attachments in emails and on the web

B. You cannot prevent the use of malware to steal your password

C. Use the "Remember Me?" function in your Web browser

D. Use a long and complex password

A. Be wary of links or attachments in emails and on the web

500

What is not a characteristic of a Public Wireless Network?

A. Not password-protected

B. Invulnerable to online attacks

C. Not encrypted

D. Can be accessed by any device

B. Invulnerable to online attacks

500

Which is not true about data breaches?

A. You can better protect yourself by changing your passwords every 90 days

B. Data breaches are typically made public immediately

C. Organizations must disclose data breaches publicly

D. A data breach can happen through no fault of your own

B. Data breaches are typically made public immediately