Search Header Logo
Cybersecurity Tabletop Exercise - Personal Cybersecurity

Cybersecurity Tabletop Exercise - Personal Cybersecurity

Assessment

Presentation

Computers

Professional Development

Hard

Created by

Domingo Jr.

Used 1+ times

FREE Resource

5 Slides • 0 Questions

1

Scenario # 1

You just started working on your assigned tasks for the day. You opened your email inbox and went through the emails one by one. After a while, you realized that you've downloaded and clicked a Word Document attachment from an unknown sender. What action will you take?

Personal Cybersecurity

Cybersecurity Tabletop Exercise

2

Scenario # 2

You need to convert a confidential PDF file with 40 pages back to a Word Document file. Unfortunately, you don't have a Pro Version of PDF software that can do that. While surfing the internet you saw an online conversion service that does the job. What action will you take?

Personal Cybersecurity

Cybersecurity Tabletop Exercise

3

Scenario # 3

You have some newly hired personnel. Your supervisor told you to do some security briefing for your new colleagues. He specifically mentioned secured passwords, WiFi access, and securing of office laptops and devices. What action will you take?

Personal Cybersecurity

Cybersecurity Tabletop Exercise

4

Scenario # 4

You discovered your main email address credentials were posted by an individual on a cybercrime forum/website. What action will you take?

Personal Cybersecurity

Cybersecurity Tabletop Exercise

5

Scenario # 5

HR announced that everyone should join the organization mid-year planning 2022. Every team must come up with three suggestions that the organization can do to improve the company's cybersecurity posture which will be implemented next year. What input you wnat to suggest for your organization?

Personal Cybersecurity

Cybersecurity Tabletop Exercise

Scenario # 1

You just started working on your assigned tasks for the day. You opened your email inbox and went through the emails one by one. After a while, you realized that you've downloaded and clicked a Word Document attachment from an unknown sender. What action will you take?

Personal Cybersecurity

Cybersecurity Tabletop Exercise

Show answer

Auto Play

Slide 1 / 5

SLIDE