CYBER AWARENESS TRAINING QUIZ

Name(Required)
1. What does the “https://” at the beginning of a URL denote, as opposed to “http://” (without the “s”)?(Required)
2. Which of the following is an example of a “phishing” attack?(Required)
3. Who is responsible for Cyber Security at your Organisation?(Required)
4. Some websites and online services use a security process called two-step authentication. Which of the following images is an example of two-step authentication?(Required)
Quiz Image 1

Image 1

Quiz Image 2

Image 2

Quiz Image 3

Image 3

5. Which of the following four passwords is considered secure?(Required)
6. Criminals access someone’s computer and encrypt the user’s personal files and dat(A) The user is unable to access this data unless they pay the criminals to decrypt the files. This practice is called(Required)
7. “Private browsing” is a feature in many internet browsers that lets users access web pages without any information (like browsing history) being stored by the browser. Can internet service providers see the online activities of their subscribers when those subscribers are using private browsing?(Required)
8. Who can you share your password with?(Required)
9. If a public Wi-Fi network (such as in an airport or café) requires a password to access, is it generally safe to use that network for sensitive activities such as online banking?(Required)
10. What kind of cybersecurity risks can be minimized by using a Virtual Private Network (VPN)?(Required)
11. What is the best method to ensure you can respond to a Cyber Attack?(Required)
12. Who should have Administrative Rights on your PC/Laptop?(Required)
13. Which of the following Reusable media can you safely use?(Required)
14. Which of the following is not safe practice when working in a public area?(Required)
15. Who are the primary targets of a Whaling attack?(Required)
16. What should I do if I receive a supplier invoice with new bank account details?(Required)
17. How should I safely dispose of my old laptop/PC/tablet/phone?(Required)
18. What information can a potential hacker gain from your social media profiles?(Required)
19. What should you do if you believe you have received a phishing email?(Required)
20. Now that I have completed this training, I am completely cyber-secure:(Required)