Cybersecurity Quiz Answer Key
Cybersecurity Quiz Answer Key
iLm!J@c)&dl^A
Passwords that contain words that can be found in the dictionary, or contain keyboard adjacencies are
very simple for hackers to crack using simple password cracking programs. Even replacing one letter here
or there or using slang is very common and easily guessed. Best practice is to use a password that is at
least 12 characters in length and is complex which means it contains a combination of upper and
lowercase letters, numbers and special characters.
_____________________________________________________
2. TRUE or FALSE: Attachments should always be treated with caution,
even if you know the sender.
TRUE
Attachments from an unknown source should never be opened. But attachments that appear to be from
a known source can also be dangerous. If you receive an attachment that you weren't expecting or if it is
not in keeping with how this contact normally communicates, best practice - even when you know the
supposed sender - is to verify the legitimacy first.
_____________________________________________________
3. When visiting your favorite website, a pop-up appears that reads "You
have won a free Apple iPod!" What should you do?
Do not click the pop-up - close it, and if possible, report it to an administrative
contact on the page you were on
When an offer seems too good to be true, it is. Remember that social engineering tactics such as these
are specifically designed to persuade you to react emotionally, usually out of fear or excitement.
_____________________________________________________
4. Which website URL is legitimate?
https://www.paypal.com/us/home
Some notable differences in the incorrect URL's are: PayPal will always use "https" because they are
collecting personal information and extra security is required; anything before the forward slash is where
you'll be taken, so any extra characters before the / are suspect; slight misspellings or extra characters
(such as "payapl" and "pay.pal") are also red flags that you are being directed to a malicious site. They can
be difficult to spot, so be sure to carefully check URL's.
_____________________________________________________
Phone: 1.877.367.9348 E: [email protected] www.corsicatech.com
5. You receive an email that says your PayPal account has been
suspended pending confirmation of your personal information. The
PayPal logo is in the body of the email, and the email is addressed "Dear
Customer". The sender email is Service@PayPal-
CustomerServiceTeam.com. What should you do?
Delete the email - it is a phishing attempt
Spoofed emails can be difficult to spot, so it's important to look at the sender's information as well as you
are addressed. As an account holder, you would most likely receive a personalized email. If you are
uncertain and want to check on your account, you should contact them directly, either by phone or by
logging directly into the verified site in a clean browser window.
_____________________________________________________
6. You receive an email from a co-worker with an attachment. The
subject line reads "Please See Attached Document". The email contains
no further information. What should you do?
If you weren't expecting an attachment, it should always be treated with caution. Any messages that are
out of sync with how the sender usually communicates are also suspect (i.e. no greeting, no details
provided, etc.). If there is a question, make a call to the known contact info of the sender and confirm the
validity of the message before proceeding. If you know the email is spoofed, delete it.
_____________________________________________________
7. You receive a text message warning you that your bank account has
been suspended. If says that you must click on the link in the SMS and
update your credentials with the next 24 hours. Is this message safe or
unsafe?
Unsafe
Any message that attempts to create an extreme sense of urgency is suspect and therefore considered
unsafe. Text messages are no exception. If you have concerns about the status of your bank account,
contact the bank directly by phone or by logging into their known website in a clean browser window.
Remember to always stay in control of where you land on the internet.
There are safe ways to test a link without actually clicking on it. One way is to know the red flags of a
malicious link, so that you are able to spot obvious attempts. But you can also hover over it, use a link
expanding tool, or a link scanner.
_____________________________________________________
Phone: 1.877.367.9348 E: [email protected] www.corsicatech.com
9. TRUE or FALSE: Using two-factor authentication is not an effective tool
for securing your accounts.
FALSE
Two-factor authentication is an easy and very effective way to secure your accounts against unauthorized
access. With 2FA in place, you can prevent a hacker from accessing your account even if they have
cracked or stolen your password. It works by requiring a second piece of information be input - usually a
pin or a code - when a login attempt is made from an unrecognized device.
_____________________________________________________
10. What is the only true guarantee against data loss due to a cyber-
attack such as ransomware?
FALSE
Anti-virus software alone is no longer enough. Network security today requires a multi-layered approach
that includes firewalls, patch management, end-point protection, admin controls, end-user education
and data backups management.
_____________________________________________________
13. TRUE or FALSE: Cybersecurity is IT's responsibility. The everyday end-
users in the office don't need to worry about this topic.
FALSE
Cybersecurity is every employee's responsibility. Every single end-user needs to be aware of the cyber-
risks that are a threat to the business because all it takes is one bad click to find yourself in the middle of
an IT disaster.
_____________________________________________________
Phone: 1.877.367.9348 E: [email protected] www.corsicatech.com
14. TRUE or FALSE: Software and application updates are not important
and can just be ignored.
FALSE
Keeping your technology up-to-date is critical for overall security. Cyber-criminals routinely exploit
known vulnerabilities in popular office products and online applications. When vendors issue those
patches, they should be applied as soon as possible to defend against attacks targeting them.
_____________________________________________________
TRUE
Hackers will often craft phishing campaigns as if they are coming from well-known, reputable brands.
They can very easily spoof emails to match the look of standard messages from these companies. This is
why it's so important to review the sender information, check the destination URL and to be suspicious of
any message that is attempting to create a sense of urgency.