Test and Answer Key 2021-22
Test and Answer Key 2021-22
3. If you receive a phone call or email from an unknown individual asking about your invoice payment
process, you should:
A. Provide full and complete answers to all questions
B. Take all questions down and send answers via email
C. Answer only questions for which you know the answer for sure
D. Do not answer questions, but take the caller's contact info, and consult your IT department and
purchasing department
5. What is ransomware?
A. Software that protects your computer from viruses
B. Cryptocurrency, like bitcoin
C. Malware that locks users out of their devices or blocks access to files until a sum of money
is paid
6. What is the meaning of “threat” with regards information security?
A. The use of strong language to get wanted reaction
B. The potential targeting of a network or system in an attempt to damage, harm or disrupt its
capability to operate.
C. Continual texting and communicating through social media
D. None of the above
9. What type of tactic used in a cybersecurity attack would be best described as “an email targeted at a
specific individual or department within an organization that appears to be from a trusted source”?
A. Robocalling
B. Ghosting
C. Catfishing
D. Spear Phishing
10. If you click on an unknown link or attachment in a suspicious email and then wonder “what you just
clicked”, what if any actions should you take?
A. Watch the screen for at least five minutes to make sure nothing out of the ordinary occurs
B. Restart your computer to make sure it has not been infected
C. Contact your IT department or person in your organization who is responsible for computer
operations
D. Continue with your normal activities and let the organization’s firewall or virus scan address the
threat
Cybersecurity Awareness Training Assessment
Answer Key
2. E – All of the above are suggested if you are suspicious of an email’s content or origin.
3. D – Phone calls or emails requesting information about your organization’s payment process should
be treated with suspicion. Do not respond unless it is determined that the caller is legitimate.
5. C— Cybercriminals attempt to encrypt data or block access to your system for financial gain with
ransomware.
6. B - Threats can involve the intrusion or disclosure of confidential information to unauthorized people.
8. D – All of the above are tactics used by cybercriminals, and there are others.
9. D– A criminal that uses spear phishing utilizes details to make the email seem legitimate.
10. C – If you make a mistake, timing is critical. Notify your IT professionals immediately.