Survey Summary
0 of 20 Questions completed
Questions:
Information
You have already completed the survey before. Hence you can not start it again.
Survey is loading…
You must sign in or sign up to start the survey.
You must first complete the following:
Results
Results
0 of 20 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 20
1. Question
- To be successful, social engineering relies on:
CorrectIncorrect -
Question 2 of 20
2. Question
2. All of these are ways to mitigate the social engineering threat EXCEPT:
CorrectIncorrect -
Question 3 of 20
3. Question
Ransomware is:
CorrectIncorrect -
Question 4 of 20
4. Question
4. Attackers may do the following to company data encrypted (locked) by ransomware:
CorrectIncorrect -
Question 5 of 20
5. Question
5. Phishing may involve all the following EXCEPT:
CorrectIncorrect -
Question 6 of 20
6. Question
6. Ransomware can do which of the following:
CorrectIncorrect -
Question 7 of 20
7. Question
7. An email that claims to be about a refund from Company XYZ is from the email address Baxter.CompanyXYZ@gmail.com is likely to be fraudulent and may be a phishing scam.
CorrectIncorrect -
Question 8 of 20
8. Question
8. Attackers use ransomware attacks more than any other kind of cyberattack because:
CorrectIncorrect -
Question 9 of 20
9. Question
9. It is OK to use the same password for work and personal accounts, as long as it is at least 12 characters long, and uses upper and lower case letters, numbers, and special characters.
A. True.
B. False.
CorrectIncorrect -
Question 10 of 20
10. Question
10. Mobile device security is harder because:
CorrectIncorrect -
Question 11 of 20
11. Question
11. Mobile device security mitigations include:
CorrectIncorrect -
Question 12 of 20
12. Question
12. If you suspect someone does not belong in your office area, you should:
CorrectIncorrect -
Question 13 of 20
13. Question
13. What cybersecurity threat can you mitigate by not wearing your badge outside of your office?
CorrectIncorrect -
Question 14 of 20
14. Question
14. True or False: Only employees of a company can be insider threats.
CorrectIncorrect -
Question 15 of 20
15. Question
15. An employee who mistakenly loses an unencrypted company laptop that is found and exploited by criminal, is an example of:
CorrectIncorrect -
Question 16 of 20
16. Question
16. The following are motivations for intentional insider threats EXCEPT:
CorrectIncorrect -
Question 17 of 20
17. Question
17. Indicators of possible insider threat activity include:
CorrectIncorrect -
Question 18 of 20
18. Question
18. Secure passphrases are comprised of:
CorrectIncorrect -
Question 19 of 20
19. Question
It is OK to give IT support people your password if they ask for it.
A. True.
B. False.
CorrectIncorrect -
Question 20 of 20
20. Question
20. The main motivations that lead to successful social engineering attacks are:
CorrectIncorrect