Search Header Logo

Information Security Awareness 2024

Authored by Gordon Donkoh

Computers

Professional Development

Used 4+ times

Information Security Awareness 2024
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 sec • 20 pts

Media Image

Which of the following is NOT a common threat mentioned in the training?

Phishing

Insider Threats

Blockchain Analysis

Malware

2.

MULTIPLE CHOICE QUESTION

5 sec • 20 pts

Media Image

What is a key best practice for passwords?

Use the same password for multiple accounts for easy recall

Include personal information to make the password memorable

Keep passwords short for quick typing

Combine letters, numbers, and symbols to increase complexity

3.

MULTIPLE CHOICE QUESTION

5 sec • 20 pts

Media Image

How can you identify suspicious emails?

By checking if it was sent during business hours

By verifying the sender's email address and looking for unusual content

By the number of attachments it has

By checking if it contains a greeting

4.

MULTIPLE CHOICE QUESTION

5 sec • 20 pts

Media Image

Which of the following acts as the first line of defense in IT security?

Antivirus Software

Firewall hardware

Individual Vigilance by employees

Laptops

5.

MULTIPLE CHOICE QUESTION

5 sec • 20 pts

Media Image

What is the purpose of Information Security?

To increase the speed of computer networks

To protect data from unauthorized access and threats

To ensure uninterrupted internet service

To monitor employee activities online

6.

MULTIPLE CHOICE QUESTION

5 sec • 20 pts

Media Image

What are the protocols for reporting security incidents?

Follow established steps and report suspicions promptly

Ignore minor incidents to avoid overloading IT staff

Attempt to resolve the issue personally before reporting

Sit and drink Sobolo

7.

MULTIPLE CHOICE QUESTION

5 sec • 20 pts

Media Image

Why is it important to act as a 'Human Firewall'?

To replace antivirus software on my computer

To serve as a critical line of defense against Cyber threats

To be a marketing agent

To create physical security barriers at work

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?