null
US
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
Next up
Copy and Edit
You need to log in to complete this action!
Register for Free
5956566
Information Security Awareness Quiz 1
Description
Information Security Awareness Quiz
No tags specified
information security awareness quiz
quiz
it
compliance officer
Quiz by
Sushil Verma
, updated more than 1 year ago
More
Less
Created by
Sushil Verma
over 8 years ago
169
0
0
Resource summary
Question 1
Question
Why is it important to have a good understanding of Information Security policies and procedures?
Answer
Helps protect individuals from being victims of security incidents.
Provides an understanding of steps to follow in the event of a security incident.
Helps to understand levels of responsibility.
All of the above
Question 2
Question
Which of the following is a good way to create a password?
Answer
Your children's or pet's names
Using look-alike substitutions of numbers or symbols
A combination of upper and lowercase letters mixed with numbers and symbols
Using common names or words from the dictionary
Question 3
Question
What is the most common delivery method for viruses?
Answer
Email
USB Drives
Instant Message
Internet download
Question 4
Question
When receiving an email from an unknown contact that has an attachment, you should:
Answer
Open the attachment to view its contents
Report to reportphising@globalsign.com & delete the email
Forward the email to your co-workers to allow them to open the attachment first
Forward the email to your personal email account so you can open it at home
Show full summary
Hide full summary
Want to create your own
Quizzes
for
free
with GoConqr?
Learn more
.
Similar
Common Technology Terms
Julio Aldine Branch-HCPL
Project Communications Management
farzanajeffri
Network Protocols
Shannon Anderson-Rush
Abstraction
Shannon Anderson-Rush
Computing
Kwame Oteng-Adusei
HTTPS explained with Carrier Pigeons
Shannon Anderson-Rush
Translations and transformations of functions
Christine Laurich
Introduction to the Internet
Shannon Anderson-Rush
Construcción de software
CRHISTIAN SUAREZ
Historical Development of Computer Languages
Shannon Anderson-Rush
Useful String Methods
Shannon Anderson-Rush
Browse Library