Which is not a characteristic of a general phishing message?
a) highly personalized
b) easy to spot
c) sent to thousands at a time
d) opportunistic
a) highly personalized
Using a virtual private network, or VPN, will encrypt all transmissions from your device, making it more difficult for attackers to intercept.
A. True
B. False
A. True
A strong password is as lengthy as possible and includes uppercase letters, lowercase letters, numbers, and special characters.
A) True
B) False
A) True
Why should you maintain a clean and organized workspace?
A. Spot sensitive information you've left out
B. Detect if something goes missing
C. Prevent a fire hazard
D. All of these answers are correct
D. All of these answers are correct
Stupid
Pointless
Annoying
Messages
How many employees must fall for a phish to compromise our organization?
1!
Which of the following should be avoided at work?
A. Peer-to-peer file sharing
B. Sites with adult content
C. Unknown URLs
D. All of these should be avoided
D. All of these should be avoided
A strong password is:
A) Random
B) Changing
C) Unique
D) Complex
E) All of the above
E) All of the above
The two main functions of physical security are:
A. Detection and recovery
B. Deterrence and recovery
C. Deterrence and detection
D. Detection only
C. Deterrence and detection
Spear Phishing email are malicious emails designed to trick small groups or individuals into sharing information or allowing malicious code to run on their device.
a. True
b. False
a. True
Why are spam filters unlikely to stop a spear phishing attack?
a) They never contain malware
b) They're sent in small batches
c) They're sent in large batches
b) They're sent in small batches
Why do we recommend to avoid clicking on advertisements?
A. Ad networks can be corrupted with malicious links
B. Ads are annoying
C. Ads are usually safe to click on
D. Ads may be take you to a competitor’s website
A. Ad networks can be corrupted with malicious links
Which of the following is not part of our password policy?
A. Passwords must not be shared
B. Passwords must consist of at least ten (10) characters
C. Passwords must be changed every 90 days
D. All of above are part of our policy
D. All of above are part of our policy
What does physical security prevent?
A. Unauthorized physical access to a technical device
B. Cyber crime
C. Social engineering attacks
D. Viruses and spam
A. Unauthorized physical access to a technical device
_______ emails may attempt to solicit sensitive information or trick you in to visiting malicious sites or installing malware.
a. Spam
b. Phishing
c. Marketing
d. Social Networking
b. Phishing
Spear phishers may seek the following information in a data entry attack:
a) Password
b) Credit card number
c) Data Entry attacks don't solicit information
d) Both password & credit card number
d) Both password & credit card number
Sensitive data should be stored:
A. Personal computer
B. Flash drive
C. On an encrypted drive
D. Unprotected file sharing site
C. On an encrypted drive
Which is an example of multi-factor authentication?
A. Single-use code sent to your cell phone
B. QR Code
C. Single-use code sent to your tablet
D. These are all examples of multi-factor authentication
D. These are all examples of multi-factor authentication
Which is not a target for physical theft?
A. Online network
B. Laptop/personal computer
C. Mobile/touch devices
D. Confidential documents
A. Online network
Which is not correct about software updates?
A. They are a popular lure in phishing scams
B. They can remove security flaws
C. They are safe to download from an email attachment
D. They can improve the user experience
C. They are safe to download from an email attachment
An indicator of a phishing email:
a. All listed
b. comes from an unknown sender
c. urges you to click a link?
d. appeals to your curiosity
a. All listed
If you do this on a mobile device, you will be able to see the destination URL.
A. Press and hold
B. Double tap
C. Slide to the left
D. Zoom in
A. Press and hold
How can you prevent malware from being used to steal your password?
A. Be wary of links or attachments in emails and on the web
B. You cannot prevent the use of malware to steal your password
C. Use the "Remember Me?" function in your Web browser
D. Use a long and complex password
A. Be wary of links or attachments in emails and on the web
What is not a characteristic of a Public Wireless Network?
A. Not password-protected
B. Invulnerable to online attacks
C. Not encrypted
D. Can be accessed by any device
B. Invulnerable to online attacks
Which is not true about data breaches?
A. You can better protect yourself by changing your passwords every 90 days
B. Data breaches are typically made public immediately
C. Organizations must disclose data breaches publicly
D. A data breach can happen through no fault of your own
B. Data breaches are typically made public immediately