General Cybersecurity Awareness Quiz PDF
Document Details
Uploaded by Deleted User
Tags
Summary
This is a cybersecurity awareness quiz, covering topics like phishing, ransomware, and remote work security, with multiple choice questions.
Full Transcript
**. General Cybersecurity Awareness** **Quiz Questions:** 1. Which of the following is the biggest cybersecurity threat to organizations?\ a) Natural disasters\ b) Insider threats\ c) External hackers\ d) Software vulnerabilities *(Correct Answer)* 2. What can happen if you...
**. General Cybersecurity Awareness** **Quiz Questions:** 1. Which of the following is the biggest cybersecurity threat to organizations?\ a) Natural disasters\ b) Insider threats\ c) External hackers\ d) Software vulnerabilities *(Correct Answer)* 2. What can happen if you plug a personal device into a work computer?\ a) Nothing, it\'s perfectly safe\ b) It could introduce malware to the network *(Correct Answer)*\ c) Personal data will be backed up automatically\ d) Work files will be copied to the device 3. True or False: A VPN ensures complete immunity from cyberattacks.\ a) True\ b) False *(Correct Answer)* 4. What is the most secure password?\ a) password123\ b) P\@ssw0rd!\ c) LongPhraseWithNumbers123! *(Correct Answer)*\ d) qwerty 5. What should you do before updating software?\ a) Click on any update prompt\ b) Ignore updates entirely\ c) Verify updates through official channels *(Correct Answer)*\ d) Disable all update notifications **2. Protecting Personally Identifiable Information (PII)** **Quiz Questions:** 1. What is PII?\ a) Public Internet Information\ b) Personally Identifiable Information *(Correct Answer)*\ c) Personal Identity Index\ d) Private Information Institution 2. Which of the following is NOT an example of PII?\ a) Credit card number\ b) Social Security number\ c) Business phone number *(Correct Answer)*\ d) Email address 3. What is the best way to protect sensitive data?\ a) Encrypt it *(Correct Answer)*\ b) Save it on personal devices\ c) Share it via email\ d) Back it up without encryption 4. True or False: Sharing PII without encryption is acceptable for internal use.\ a) True\ b) False *(Correct Answer)* 5. Why is protecting PII important?\ a) To comply with regulations\ b) To maintain customer trust\ c) To avoid fines\ d) All of the above *(Correct Answer)* **3. Phishing and Social Engineering** **Quiz Questions:** 1. Which of the following is a common sign of a phishing email?\ a) Urgent language\ b) Mismatched email domains\ c) Unexpected attachments\ d) All of the above *(Correct Answer)* 2. What is social engineering?\ a) A method to secure data\ b) Manipulating people to gain sensitive information *(Correct Answer)*\ c) Encrypting personal files\ d) Sharing information publicly 3. What should you do if you suspect a phishing attempt?\ a) Click the link to verify authenticity\ b) Report it to IT security *(Correct Answer)*\ c) Ignore it entirely\ d) Reply to the sender for clarification 4. Which is NOT a social engineering tactic?\ a) Pretexting\ b) Baiting\ c) Enabling 2FA *(Correct Answer)*\ d) Spear phishing 5. What is the first step to protect against phishing?\ a) Use a VPN\ b) Enable email spam filters *(Correct Answer)*\ c) Avoid public Wi-Fi\ d) Use antivirus software **4. Ransomware and Malware** **Quiz Questions:** 1. What does ransomware do?\ a) Encrypts files and demands payment *(Correct Answer)*\ b) Deletes files permanently\ c) Hacks into bank accounts\ d) Monitors user activity 2. How can you prevent malware infections?\ a) Keep software updated\ b) Use antivirus software\ c) Avoid clicking unknown links\ d) All of the above *(Correct Answer)* 3. What should you do if a ransomware attack occurs?\ a) Pay the ransom\ b) Disconnect the infected device *(Correct Answer)*\ c) Restart the system\ d) Contact the attacker 4. True or False: Paying the ransom guarantees recovery of your data.\ a) True\ b) False *(Correct Answer)* 5. Which of the following is NOT a type of malware?\ a) Virus\ b) Spyware\ c) Firewall *(Correct Answer)*\ d) Ransomware **5. Remote Work Security** **Quiz Questions:** 1. What is a common risk of remote work?\ a) Device theft\ b) Unsecured networks\ c) Sensitive data exposure\ d) All of the above *(Correct Answer)* 2. What tool should you use when connecting to public Wi-Fi?\ a) Antivirus software\ b) VPN *(Correct Answer)*\ c) File-sharing applications\ d) Password manager 3. What is a secure practice for remote work?\ a) Using strong, unique passwords *(Correct Answer)*\ b) Sharing work devices with family members\ c) Disabling antivirus software\ d) Avoiding software updates 4. How can you secure your home Wi-Fi network?\ a) Use a strong, unique password\ b) Enable WPA3 encryption\ c) Regularly update router firmware\ d) All of the above *(Correct Answer)* 5. What should you do if you suspect a security breach while working remotely?\ a) Ignore it\ b) Report it to IT immediately *(Correct Answer)*\ c) Continue working as usual\ d) Try to fix it yourself **6. Incident Reporting and Management** **Quiz Questions:** 1. What is the first step in responding to a suspected security incident?\ a) Ignore it\ b) Report it to the IT team *(Correct Answer)*\ c) Investigate on your own\ d) Disconnect from the internet 2. Which of the following should be included in an incident report?\ a) Description of the event\ b) Date and time of the incident\ c) Actions taken in response\ d) All of the above *(Correct Answer)* 3. Why is it important to report security incidents immediately?\ a) To minimize damage\ b) To allow quick mitigation\ c) To prevent further attacks\ d) All of the above *(Correct Answer)* 4. True or False: Incident response is solely the responsibility of IT.\ a) True\ b) False *(Correct Answer)* 5. What should you NOT do when responding to a security incident?\ a) Panic\ b) Tamper with evidence *(Correct Answer)*\ c) Follow the incident response plan\ d) Report to management **7. Secure Use of Software and Tools** **Quiz Questions:** 1. Why is it important to regularly update software and tools?\ a) To access new features\ b) To fix security vulnerabilities *(Correct Answer)*\ c) To increase compatibility\ d) All of the above 2. Which is NOT a secure way to share sensitive files?\ a) Using encrypted file-sharing platforms\ b) Sending through secure email\ c) Using public file-sharing services *(Correct Answer)*\ d) Sharing via password-protected links 3. What is the purpose of a password manager?\ a) To store strong passwords securely *(Correct Answer)*\ b) To bypass two-factor authentication\ c) To share passwords with coworkers\ d) To track login attempts 4. How can you ensure the safe use of collaboration tools like MS Teams?\ a) Avoid clicking unknown links in chats\ b) Restrict access to sensitive channels\ c) Use strong passwords for accounts\ d) All of the above *(Correct Answer)* 5. What is the primary purpose of a VPN?\ a) Encrypt and secure communication *(Correct Answer)*\ b) Increase internet speed\ c) Block malware\ d) Boost Wi-Fi signal strength