General Cybersecurity Awareness Quiz
35 Questions
4 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is the biggest cybersecurity threat to organizations?

  • Software vulnerabilities (correct)
  • Insider threats
  • Natural disasters
  • External hackers
  • What can happen if you plug a personal device into a work computer?

  • Nothing, it's perfectly safe
  • It could introduce malware to the network (correct)
  • Personal data will be backed up automatically
  • Work files will be copied to the device
  • True or False: A VPN ensures complete immunity from cyberattacks.

    False

    What is the most secure password?

    <p>LongPhraseWithNumbers123!</p> Signup and view all the answers

    What should you do before updating software?

    <p>Verify updates through official channels</p> Signup and view all the answers

    What is PII?

    <p>Personally Identifiable Information</p> Signup and view all the answers

    Which of the following is NOT an example of PII?

    <p>Business phone number</p> Signup and view all the answers

    What is the best way to protect sensitive data?

    <p>Encrypt it</p> Signup and view all the answers

    True or False: Sharing PII without encryption is acceptable for internal use.

    <p>False</p> Signup and view all the answers

    Why is protecting PII important?

    <p>All of the above</p> Signup and view all the answers

    Which of the following is a common sign of a phishing email?

    <p>All of the above</p> Signup and view all the answers

    What is social engineering?

    <p>Manipulating people to gain sensitive information</p> Signup and view all the answers

    What should you do if you suspect a phishing attempt?

    <p>Report it to IT security</p> Signup and view all the answers

    Which is NOT a social engineering tactic?

    <p>Enabling 2FA</p> Signup and view all the answers

    What is the first step to protect against phishing?

    <p>Enable email spam filters</p> Signup and view all the answers

    What does ransomware do?

    <p>Encrypts files and demands payment</p> Signup and view all the answers

    How can you prevent malware infections?

    <p>All of the above</p> Signup and view all the answers

    What should you do if a ransomware attack occurs?

    <p>Disconnect the infected device</p> Signup and view all the answers

    True or False: Paying the ransom guarantees recovery of your data.

    <p>False</p> Signup and view all the answers

    Which of the following is NOT a type of malware?

    <p>Firewall</p> Signup and view all the answers

    What is a common risk of remote work?

    <p>All of the above</p> Signup and view all the answers

    What tool should you use when connecting to public Wi-Fi?

    <p>VPN</p> Signup and view all the answers

    What is a secure practice for remote work?

    <p>Using strong, unique passwords</p> Signup and view all the answers

    How can you secure your home Wi-Fi network?

    <p>All of the above</p> Signup and view all the answers

    What should you do if you suspect a security breach while working remotely?

    <p>Report it to IT immediately</p> Signup and view all the answers

    What is the first step in responding to a suspected security incident?

    <p>Report it to the IT team</p> Signup and view all the answers

    Which of the following should be included in an incident report?

    <p>All of the above</p> Signup and view all the answers

    Why is it important to report security incidents immediately?

    <p>All of the above</p> Signup and view all the answers

    True or False: Incident response is solely the responsibility of IT.

    <p>False</p> Signup and view all the answers

    What should you NOT do when responding to a security incident?

    <p>Tamper with evidence</p> Signup and view all the answers

    Why is it important to regularly update software and tools?

    <p>To fix security vulnerabilities</p> Signup and view all the answers

    Which is NOT a secure way to share sensitive files?

    <p>Using public file-sharing services</p> Signup and view all the answers

    What is the purpose of a password manager?

    <p>To store strong passwords securely</p> Signup and view all the answers

    How can you ensure the safe use of collaboration tools like MS Teams?

    <p>All of the above</p> Signup and view all the answers

    What is the primary purpose of a VPN?

    <p>Encrypt and secure communication</p> Signup and view all the answers

    Study Notes

    General Cybersecurity Awareness

    • Biggest cybersecurity threat to organizations: Software vulnerabilities.
    • Personal device plugged into work computer: Could introduce malware to the network.
    • VPN and cyberattacks: A VPN does not guarantee complete immunity from cyberattacks.
    • Secure password: Long phrases with numbers and symbols.
    • Software updates: Verify updates through official channels before applying them.

    Protecting Personally Identifiable Information (PII)

    • PII definition: Personally Identifiable Information.
    • PII example (not): Business phone number.
    • PII examples: Credit card number, Social Security number, email address.

    Phishing and Social Engineering

    • Phishing email red flags: Urgent language, mismatched email domains, unexpected attachments.
    • Social engineering: Manipulating people to gain sensitive information.
    • Responding to a suspected phishing attempt: Report it to IT security.
    • Not a social engineering tactic: Enabling 2FA.
    • Protecting against phishing: Enable email spam filters.

    Ransomware and Malware

    • Ransomware action: Encrypts files and demands payment.
    • Preventing malware infections: Keep software updated, use antivirus software, avoid clicking unknown links.
    • Ransomware attack response: Disconnect the infected device.
    • Ransom payment and data recovery: Paying the ransom does not guarantee data recovery.
    • Not a type of malware: Firewall.

    Remote Work Security

    • Remote work risk: Unsecured networks, device theft, sensitive data exposure.
    • Public Wi-Fi security: Use a VPN.

    Incident Reporting and Management

    • First step in security incident response: Report it to the IT team.
    • Incident report components: Description of the event, date and time of the incident, actions taken in response.
    • Importance of immediate incident reporting: Minimizes damage, allows quick mitigation, prevents further attacks.
    • Incident response responsibility: Not solely the responsibility of IT.
    • Security incident actions to avoid: Tampering with evidence.

    Secure Use of Software and Tools

    • Software updates importance: To fix security vulnerabilities.
    • Secure file sharing: Use encrypted file-sharing platforms, secure email, password-protected links.
    • Password manager purpose: To store strong passwords securely.
    • Collaboration tools security: Avoid clicking unknown links, restrict access to sensitive channels, use strong passwords.
    • VPN purpose: To encrypt and secure communication.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Test your knowledge on important cybersecurity practices, including threats, securing PII, and identifying phishing attempts. This quiz covers key principles that every individual should know to protect themselves and their organizations from cyber threats.

    More Like This

    Cybersecurity Awareness
    18 questions

    Cybersecurity Awareness

    AwestruckRetinalite avatar
    AwestruckRetinalite
    Cybersecurity Awareness and Training Quiz
    18 questions
    Use Quizgecko on...
    Browser
    Browser