0% found this document useful (0 votes)
25 views

Test and Answer Key 2021-22

Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views

Test and Answer Key 2021-22

Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Cybersecurity Awareness Training Assessment of Knowledge (Test)

Employee Name (Printed): _________________________ __ Date: __ __ _____ __


Employer: _______________ ___ Department: _______ __________________
Original Test Score: __________________ Corrected Test Score: _________________
Please complete each question (10 questions) and pick the correct answer. (Circle one letter).

1. Which of the following are personal identifiable information?


A. Your IP address (an example is the number assigned to your computer)
B. Your birthplace
C. Driver’s license number
D. All of the above

2. If you are suspicious of an email, what should you do?


A. Do not click on the links provided in the email.
B. Do not open any attachments in the email.
C. Do not provide personal information or data.
D. Forward the email to your IT department
E. All of the above

3. If you receive a phone call or email from an unknown individual asking about your invoice payment
process, you should:
A. Provide full and complete answers to all questions
B. Take all questions down and send answers via email
C. Answer only questions for which you know the answer for sure
D. Do not answer questions, but take the caller's contact info, and consult your IT department and
purchasing department

4. Which is a good password practice?


A. Avoid single words found in a dictionary or proper nouns.
B. Do not keep copies of passwords where others can see them, preferably not on paper
anywhere, or in any clear-text electronic format.
C. Do not share your passwords to anyone else.
D. Do not use the same passwords, or close variation, on multiple systems, including personal
ones.
E. All of the above are good practices

5. What is ransomware?
A. Software that protects your computer from viruses
B. Cryptocurrency, like bitcoin
C. Malware that locks users out of their devices or blocks access to files until a sum of money
is paid
6. What is the meaning of “threat” with regards information security?
A. The use of strong language to get wanted reaction
B. The potential targeting of a network or system in an attempt to damage, harm or disrupt its
capability to operate.
C. Continual texting and communicating through social media
D. None of the above

7. Which is not a good security practice?


A. Use Multi-Factor Authentication for your accounts
B. Use one complex password for all your accounts
C. Use face recognition and/or password for your smartphone
D. Verify the email sender’s domain of a suspicious email and if you need to call, find another
source for the phone number outside of the email.

8. Which of the following are types of tactics used in a cybersecurity attack?


A. Phishing
B. Malware
C. Ransomware
D. All of the above

9. What type of tactic used in a cybersecurity attack would be best described as “an email targeted at a
specific individual or department within an organization that appears to be from a trusted source”?
A. Robocalling
B. Ghosting
C. Catfishing
D. Spear Phishing

10. If you click on an unknown link or attachment in a suspicious email and then wonder “what you just
clicked”, what if any actions should you take?
A. Watch the screen for at least five minutes to make sure nothing out of the ordinary occurs
B. Restart your computer to make sure it has not been infected
C. Contact your IT department or person in your organization who is responsible for computer
operations
D. Continue with your normal activities and let the organization’s firewall or virus scan address the
threat
Cybersecurity Awareness Training Assessment
Answer Key

1. D— All of these are considered personal data.

2. E – All of the above are suggested if you are suspicious of an email’s content or origin.

3. D – Phone calls or emails requesting information about your organization’s payment process should
be treated with suspicion. Do not respond unless it is determined that the caller is legitimate.

4. E — All are steps that should be taken with your passwords.

5. C— Cybercriminals attempt to encrypt data or block access to your system for financial gain with
ransomware.

6. B - Threats can involve the intrusion or disclosure of confidential information to unauthorized people.

7. B – Repeating password across accounts is not recommended, even if it is a complex password.

8. D – All of the above are tactics used by cybercriminals, and there are others.

9. D– A criminal that uses spear phishing utilizes details to make the email seem legitimate.

10. C – If you make a mistake, timing is critical. Notify your IT professionals immediately.

You might also like