1) Which of the following should you do to restrict access to your files and devices? a) Update your software once a year. b) Share passwords only with colleagues you trust. c) Have your staff members access information via an open Wi-Fi network. d) Use multi-factor authentication. 2) Backing up important files offline, on an external hard drive or in the cloud, will help protect your business in the event of a cyber attack. True or False? a) True b) False 3) Which is the best answer for which people in a business should be responsible for cybersecurity? a) Business owners. They run the business, so they need to know cybersecurity basics and put them in practice to reduce the risk of cyber attacks. b) IT specialists, because they are in the best position to know about and promote cybersecurity within a business. c) Managers, because they are responsible for making sure that staff members are following the right practices. d) All staff members should know some cybersecurity basics to reduce the risk of cyber attacks. 4) Cyber criminals only target large companies. True or False? a) True b) False 5) An email from your boss asks for the name, address, and credit card information of the company’s top clients. The email says it’s urgent and to please reply right away. You should reply right away. True or False? a) True b) False 6) You get a text message from a vendor who asks you to click on a link to renew your password so that you can log in to its website. You should: a) Reply to the text to confirm that you really need to renew your password. b) Pick up the phone and call the vendor, using a phone number you know to be correct, to confirm that the request is real. c) Click on the link. If it takes you to the vendor’s website, then you’ll know it’s not a scam. 7) If you fall for a phishing scam, what should you do to limit the damage? a) Delete the phishing email. b) Unplug the computer. This will get rid of any malware. c) Change any compromised passwords. 8) Paper files that have sensitive information should be disposed of in a locked trash bin. True or False? a) True b) False 9) When you hit the “delete” key, that means the file is automatically removed from your computer. True or False? a) True b) False 10) Only people with access to sensitive data need to be trained on the importance of the physical security of files and equipment. True or False? a) True b) False 11) Someone who is posing as an IT tech requests information about your computer configuration. What kind of attack is this? a) Insider threat b) Phishing c) Social engineering d) Whaling 12) Which of the following describes monitoring software installed without your consent? a) Malware b) Adware c) Spyware d) Ransomware 13) Which one of these things is most effective for maintaining your digital privacy? a) Unsubscribing from all spam mail b) Covering your computer's front-facing camera c) Not sharing personal information on social media 14) Which part of your car is the most vulnerable to hacking? a) Cruise control b) Entertainment system c) Wireless key fob 15) The best defense against ransomware is being proactive when you: a) Purchase comprehensive cybersecurity awareness b) Back up your data regularly c) Regularly update all your devices and software with the latest security patches

Cyber Security Awareness

Leaderboard

Visual style

Options

Switch template

Continue editing: ?