Sie sind auf Seite 1von 10

Information Security Awareness

Skip <span id="mod_quiz_navblock_title">Quiz navigation</span>


Started on Monday, October 12, 2020, 5:42 PM
State Finished
Completed on Monday, October 12, 2020, 5:47 PM
Time taken 4 mins 38 secs
Points 5/5
Grade 100 out of 100
Feedback Congratulations, you passed!
Question 1
Correct
1 points out of 1

Flag question

Question text

Which description best explains cybersecurity?

Select one:
Securing cyber advantages over a business competitor
Home and business security, using motion sensors and monitored by a security vendor
Strategic Defence Initiative (SDI)
Protecting networks, devices, and data from unauthorized access 

Question 2
Correct
1 points out of 1

Flag question

Question text

Which description best identifies the term malicious code?

Select one:
A program that has flaws in it
Code that does not behave in the manner intended by its author
An unwanted file or program that can cause harm to, or compromise data on, a
computer 
Untested code that a vendor releases to the public

Question 3
Correct
1 points out of 1

Flag question

Question text

In the context of cybersecurity, which definition best describes social engineering?

Select one:
A cooperative method used to develop and improve code
A group of engineers who come together to talk code
A movement by which engineers are coerced into writing code a specific way
An exploitation of a relationship or interaction to trick a person into divulging sensitive
or personal information 

Question 4
Correct
1 points out of 1

Flag question

Question text

Which definition best describes personally identifiable information (PII)?

Select one:
Any information that someone can use to identify you 
A government-issued number that is used to identify a citizen, mostly for tax purposes
A means of identifying the author of information
Personal preferences, such as favourite settings in applications

Question 5
Correct
1 points out of 1

Flag question

Question text

Identify three examples of personally identifiable information (PII). (Choose three.)

Select one or more:


Full name 
Credit card 
Your network login credentials
Biometrics, such as a fingerprint 
A one-time passcode sent to your device

Question 1
Correct
1 points out of 1

Flag question

Question text

Identify an example of a password that best follows the password guidelines in this
lesson.

Select one:
PasswordAndAllThat
1234567890
J&JwutH2f@P0W 
qwerty123
Question 2
Correct
1 points out of 1

Flag question

Question text

Which two characteristics are examples of poor passwords? (Choose two.)

Select one or more:


A memorable passphrase written as a random sequence of keyboard keys
A predictable sequence of numbers or words 
A commonly used word or unchanged default password 
A combination of random letters, numbers, and special characters meaningful only to
you

Question 3
Correct
1 points out of 1

Flag question

Question text

Which three methods are examples of online multi-factor authentication? (Choose


three.)

Select one or more:


Software token 
Hardware token 
Passport or other government-issued identification
Password 
Full name

Question 4
Correct
1 points out of 1

Flag question

Question text

Which practice should you implement for backups?

Select one:
Encrypt the backup data for an extra layer of protection. 
Always back up your data in the cloud.
Use multiple backup vendors for redundancy.
Keep a backup device physically connected to the host computer 100% of the time.

Question 5
Correct
1 points out of 1

Flag question

Question text

Which rule is best to follow for securing passwords?

Select one:
Use something that you would never forget, like the name of your family pet.
Never leave your password on a sticky note stuck to your monitor. Instead, hide it
under your keyboard.
Use a predictable pattern of numbers or letters.
Use a combination of seemingly random upper and lowercase letters, numbers, and
special characters that is easy to remember but difficult to guess. 

Question 1
Correct
1 points out of 1
Flag question

Question text

Complete the sentence. Phishing attacks are different than spearphishing, whaling, and
vishing because they

Select one:
involve hackers hanging out at internet forums who then collect information about
individuals to target, while the others are aimed at a wide audience.
are aimed at a wide audience, while the others are directed toward individuals or
specific organizations. 
are directed against smaller players—small fish you might say, while the others use
social media sites.
use social media and social engineering techniques to lure their victims, while the
others primary use email.

Question 2
Correct
1 points out of 1

Flag question

Question text

Complete the sentence. A social engineering attack that compromises public charging
stations and installs malware when a portable device plugs in, is known as

Select one:
Juice Jacking 
Phishing
Ransomware
Spearphishing

Question 3
Correct
1 points out of 1

Flag question

Question text

You receive an email from your bank. It states that someone has your password and
that you must take immediate action by clicking the link provided. What should you
do?

Select one:
Reply to the email to confirm that they have the correct account by providing your
bank account number.
Scour the email for spelling mistakes. If there are none, then the email is legitimate
and you can click the link.
Click the link and change your password. Time is of the essence.
Delete and report it to the bank by using the contact information found on their
website. 

Question 4
Correct
1 points out of 1

Flag question

Question text

Which of the following is a good habit for protecting your mobile device?

Select one:
Change the factory-set default password and username. 
Set up a personal hotspot.
Configure your email accounts.
Test connectivity by doing online banking.

Question 5
Correct
1 points out of 1

Flag question

Question text

Which three of the following activities represents data vulnerabilities on a mobile


device. (Choose three.)

Select one or more:


Creating contacts
Synchronization between computers and mobile devices 
Listening to music
Banking 
Social networking 

Question 1
Correct
1 points out of 1

Flag question

Question text

What is the root cause of almost every data breach?

Select one:
Unpatched device
Zero-day attack
Human error 
Poorly crafted password

Question 2
Correct
1 points out of 1
Flag question

Question text

Why are insider threats one of the most challenging attack vectors?

Select one:
Network security is designed to defend against outsiders, not insiders.
Employees are trusted users who have legitimate access to an organization’s data and
resources. 
Insider attacks are common, obvious, and overwhelm IT security.
There is little that can be done to prevent a denial of service attack.

Question 3
Correct
1 points out of 1

Flag question

Question text

Which method is a defense against potential insider threats?

Select one:
Confront any person you suspect of being an insider threat.
Identify and report any suspicious activity. 
Monitor your co-workers’ daily activities.
Investigate and if possible resolve the threat on your own.

Question 4
Correct
1 points out of 1
Flag question

Question text

Who are included as insider threats?

Select one:
Any person with network security skills who works outside an organization
Another organization or person who see themselves as competitors
Employees who sometimes do not follow security practices 
Ambitious people

Question 5
Correct
1 points out of 1

Flag question

Question text

Identify two best practices for physical security awareness. (Choose two.)

Select one or more:


Lock your computer screen and mobile devices every time you step away. 
Keep your desk free of any proprietary or confidential information. 
Always be considerate, such as holding the door open for people, even if you don’t
know them.
Follow your organization’s security policies unless they hinder efficiency.

Das könnte Ihnen auch gefallen