Basic Cybersecurity Awareness

 0%

Question 1 of 18

1. Which members of our organization are responsible for basic cybersecurity?

Question 1 of 18

Question 2 of 18

2. Regularly scheduled backups of critical data, when kept offline or in a separate cloud infrastructure, can help to mitigate damage from a cyber attack on the organization.

Question 2 of 18

Question 3 of 18

3. Which of the following offers the best possible protection for sensitive company data?

Question 3 of 18

Question 4 of 18

4. Small organizations are in less danger of being targeted for cyber attacks. True or false?

Question 4 of 18

Question 5 of 18

5. What is the safest way to dispose of paper files containing sensitive information?

Question 5 of 18

Question 6 of 18

6. True or false? Using built-in Windows functionality to delete sensitive electronic files from your computer when they are no longer needed is the safest way to ensure they can't be accessed by unauthorized personnel in the future.

Question 6 of 18

Question 7 of 18

7. Only employees who have access to sensitive data need to be concerned with the physical security of devices and files.

Question 7 of 18

Question 8 of 18

8. Physical security relates to which of the following:

Question 8 of 18

Question 9 of 18

9. Choose the most correct statement from a cybersecurity perspective:

Question 9 of 18

Question 10 of 18

10. You've received an email from your manager, requesting a list of the company's top ten clients along with their addresses and credit card numbers. The email is flagged as urgent and you've been instructed to reply ASAP. You should do that. True or false?

Question 10 of 18

Question 11 of 18

11. Keeping in mind that some, none, or all parts of the following statements may be correct, choose the most correct statement:

Question 11 of 18

Question 12 of 18

12. You've fallen for a phishing scam. What's the best way to start limiting the damage?

Question 12 of 18

Question 13 of 18

13. True or false? Tech support scammers only target individuals, rather than large or small businesses. Individuals are more apt to fall for the scams because they don't have an IT department.

Question 13 of 18

Question 14 of 18

14. Which of the following describes a tech support scam?

Question 14 of 18

Question 15 of 18

15. Which of these represents the best steps to be taken when selecting a business partner (vendor or customer) who will have access to your sensitive information?

Question 15 of 18

Question 16 of 18

16. Which of the following represents best practices related to devices connecting to the company's network?

Question 16 of 18

Question 17 of 18

17. Through your workstation, you have access to sensitive company information. You're about to go on lunch break. You should:

Question 17 of 18

Question 18 of 18

18. Which of the following passwords is the most secure?

Question 18 of 18