ZDNet's technology experts deliver the best tech news and Attackers use these in wordlists to crack passwords or to gain access to existing sites for which you use this password. No, because even when you get your files back criminals might attack you later again because they are still active on your network. The idea is to make this a community effort and make these questions available for everyone. Login to where Google Mail has redirected, it’s just one of Google’s web sites – not suspicious at all. It is never too late to increase your security awareness. Ask the person sitting next to you if his Google Mail also redirects to, Find the Wireless Access Point and reboot it. Take our 10 question challenge and find out here. Q6: What are the characteristics of a strong password? October is Cyber Security awareness month. Always login to websites that have SSL or HTTPS. Take our 10 question challenge and find out here. It's not bullet proof, its not because a site is trusted it means that it could be malicous. If your username and password is stolen the account for that particular hacked website is at risk, but also your accounts for any other website were you use that same password. More tips on how to know when an account is hacked can be found in this and this blog. aurelius is the creator of n00bs CTF Labs, bug bounty hunter, security researcher at Infosec Institute and an application security analyst. 9. Why or why not? Enroll Here: National Cyber Security Awareness Quiz Answers Question 1: You receive a WhatsApp message from a known/unknown source which says, ‘All shops in … Q40: For online shopping it's best to use...? Q31: Which month is considered or recognized as Cyber Security Month? You also noticed that he has tagged some of your mutual friends too, what is the most responsible thing you can do for this situation as a cyber-savvy? October is National Cyber Security Awareness Month – that time of the year when the annual campaign to raise awareness about the importance of cybersecurity is on. To help, Cybercrime Magazine has published a free Cybersecurity Pop Quiz with 24 multiple choice questions — including an answer key — available to all businesses and employees in the U.S. When I use incognito or private mode in a browser... A: The only correct answer is 2. ... 83% of our Prime Learners got selected in Infosys. This is a common way to get malware distributed. When you pay with a credit card, the money is not directly withdrawn from your account. In this case we can see that the effective url is https://www.google.com, Google's official website. What's the best action? In any case don't reply, click on any links or open attachments in the email. Take note that antivirus software is as good as the virus database. This gives you time to dispute fraudulent charges and the bank can block the payment while they investigate the incident. Reusing the same password across multiple sites is a good idea. A: The correct answer is 4. Take a Quick Security Awareness Quiz to Find Out, enterprise information awareness training, How to Attack Windows 10 Machine with Metasploit on Kali Linux, Malicious SEO campaigns: Mitigating risk with zero-trust approach, Ask us anything about Security awareness, behavior & culture (session #2), Influencing security mindsets to build a culture of cybersecurity, Gamification — Cybersecurity’s turn to play, Unpatched address bar spoofing vulnerability impacts major mobile browsers, Why you should run your security awareness program like a marketer, Fake online shopping websites: 6 ways to identify a fraudulent shopping website, All About Carding (For Noobs Only) [Updated 2021], Security Awareness Behavior & Culture: Ask Us Anything, Password Security: Complexity vs. 50,657+ bought in last 1 month. Criminals could have hacked the email account from the CEO or pretend to be the CEO by faking the CEO's email address. Phishing is indeed a form of social engineering or in other words the psychological manipulation of people into performing actions or divulging confidential information and it can also be a mass attack. You received an email from your company’s CEO and they want you to immediately transfer a few millions to a bank account provided in the email. It's even better to close the browser tab or the browser alltogether. In any case if you doubt always reach out to the vendor to check if they really send this link. No one from Microsoft will ever call you to offer technical support. 6. How much do you really know about cybercrime? Phishing is a form of social engineering. Private or incognito browsing only implies that your search and browsing history isn't saved. The goal of this quiz is to challenge how cyber-savvy are you about the usual treats and risks then provide some knowledge sharing about each situations. A password is personal data which shouldn't be shared with others. So before facing that competitive exam the individual usually takes a step to build their confidence level for cracking the toughest exams so they find a way of getting previous question papers, searching websites for learning. He loves playing games and watching movies aside from hacking. Information Security Quiz. Advisory / Consulting, Transformation and Managed services for identity & access management, data privacy & security, application security, vulnerability management, governance, risk & compliance, emerging technologies and infrastructure & cloud Security This is a random password and thus the most secure one. A: the correct answer is 2. And a great time to give deeper thought to the billions of devices, people, enterprises, and institutions that connect with each other over the Internet, and give rise to the giant ecosystems that dominate our world. It's not a good idea, if you don't lock your device everyone in the office has the possibility to access the (confidential) data on your device. What should you do? Q30: You receive a SMS from a supplier/vendor who asks you to click on a link to renew your contract. Hang up immediately. There are simply no guarantees that you will regain access to your files or that they will not do the same again in the future because they are still active on your network and because they know you are willing to pay. Information Security Ultimate Exam Quiz! Maybe you can identify the owner. This is... Q39: Which of the following thigns help to decided whether an online shopping website is trustworthy? 1. Q1: Which of the following three is the strongest password? Only if I recognize that the phone number is from my bank. Check out these additional resources like downloadable guides to test your cybersecurity know-how. Information Technology Quiz Questions and answers 2017. Trivia Quiz User Information Security Awareness! SecurITy For IT Users Mock 1 SecurITy For IT Users Mock 1 . If not, it's a malicious email and the best action is to report and delete the email afterwards. While a lot more websites are served over HTTPS nowadays, the security risks of using public Wi-Fi are lower but it's still not to recommend to do online banking on a public Wi-Fi. The website owner can also put fake reviews of other customers on their website. starwars is not random and a commonly used password. Do not click the link and try to check the URL using an online tool that checks where it really takes you. You decide to take the quiz to receive the free glasses. Q2: Which of the following is a weak password? Leave it in the hallway or bring it to the reception desk, such that the person who lost it can get it back. Q29: Which of the following statements about a phishing email are true? Cyber savvy? Tools like urlscan.io can help you to gain more insights about a website. Phishing is a so called "spray and pray" technique in which an attacker sends out the same email to hundreds of potential targets in the hope they will fall victim. Android app security: Over 12,000 popular Android apps contain undocumented backdoors, Ultimate guide to international data protection and privacy laws, 4 types of phishing domains you should blacklist right now, When and how to report a breach: Data breach reporting best practices, The OneLogin State of Remote Work Survey Report, 10 election security predictions for the 2020 US presidential election, Top 20 Security Awareness Posters with messages that STICK, After the breach: Change your password, quickly, How your home network can be hacked and how to prevent it, SIM swapping security risks: What they are and how to protect yourself, Top 8 world crises exploited by cybercriminals and lessons learned, 4 reasons why you should include current events in your phishing simulation program. the psychological manipulation of people into performing actions or divulging confidential information, Only when there's proof or suspicion of compromise, Change the password of my account for that website, Change the password for my account for that website and of all other websites where I use that same password, One backup on an external harddisk and another one on a cloud backup, 2 backups on 2 different external harddisks, I can be sure that this is a legit, non-malicious site, The traffic between my computer (browser) and the server that runs the website is secured. Q26: Which of the following statements are correct? Cybersecurity Quizzes. Use internet slang when replying to a chat or a comment. No one can see the websites I visited, even not my Internet Service Provider. For more information also read this post. When is the best time to lie to your information security auditor or officer? Report the phishing mail and delete it afterwards. A batsman scored 110 runs which included 3 boundaries and 8 sixes. Just get record your answers as you take the quiz. Q8: Which of the following is the most secure backup strategy? Report the popup and the details to the website administrator and don’t download the Firefox browser. It might be a better idea to use your mobile data and/or switch on a VPN. Your Facebook friend has just posted a link on your timeline that contains nude pictures. That’s why we also need a two-way firewall, because it protects you while accessing anything outside. Organizational measures, for example, security clearances and limiting access on a “need-to-know” basis Technological measures, for example, the use of passwords and encryption All of the above A: The correct answer is 1. Credit cards have an insurance against fraud. Do you know a phishing scam when you see one? Q5: What should I do after I learn about a data breach of a website? Ans: Information Security Education and Awareness. Guide for Employers. Q3: How often should I change a password? Explore Job Openings in Testing across Top MNC Companies Now!. Do not use all caps when replying to emails or when commenting. They should also be unique. A: The correct answer is 2. Why is backing up data files important? What is the best course of action(s)? Information Security Ultimate Exam Quiz! Backups ensure that the information you need is there when you need it If the information is damaged it can be recovered The business continues to operate General Security 2. A: The correct answer is 3. Q20: Is the following statement true or false? A: The correct answer is 2. 8. Email Security Quiz Answers – Information Security Education Awareness Get 100 % correct answers here Security awareness quiz - answers. I will only execute the transaction after I got confirmation from the CEO through another channel. Click the link because it shouldn’t be malicious since he/she is your best friend after all. You should: A: The correct answer is 2. Hack that website and deface it then post it on Facebook or Twitter. Q14: Is it useful to run antivirus software on an Android phone? Optimizing security budget efficiency and effectiveness, 21 free training resources for Cybersecurity Awareness Month (NCSAM 2020). 13. The email comes out of the blue. Work-from-home network traffic spikes: Are your employees vulnerable? A: The correct answer is 2. It sure is convenient, but this convenience comes with a price. Ask the customer representative what bank or company he or she came from. If you reuse passwords across different sites a hack of one website can result in attackers using this stolen username and password to gain access to your accounts for another website. A: The correct answer is 4. This is a scam. Q41: I don’t use a PIN on my smartphone but keep it with me. Don't click this link. If something is too good or too unbelievable to be true it's just not true. Ashar Javed had an interesting idea to create security awareness quiz questions and asked me if I wanted to cooperate. Q21: Is it considered a good security practice to leave your machine unlocked when you leave your desk? If the pop-up is preventing you from doing this you can kill the browser process. starwars is not random and a commonly used password. Identify this logo. Should be taken after reviewing company policies or attending a training session. When you enter data on a HTTP website the data could be intercepted and/or manipulated by an attacker. Reply with my phone number and postal address, I want the 5 million dollars, Forward the email to friends, because sharing is caring, Follow the pop-up instructions to get the free access, Immediately close the pop-up and don’t proceed, Change my password immediately as per the instructions given in the email, Report it to the phishing reporting mailbox of your government, Think first, am I expecting anything? But if it's flagged malicious certainly don't visit it. A: The correct answer is 2. Take this quick security quiz and find out. Do not login into that website and report it as a phishing page to Google Safe       Browsing Team – https://www.google.com/safebrowsing/report_phish/. Some credit cards also offer additonal insurance for your online purchases. Q37: If you receive the following email, is it a good idea to proceed to get help from CBD? on a site with an address that starts with "http://"? What's the best thing to do? Tech Support Scams Quiz. Phishing Tackle Security Awareness Training. The correct answer is 4. A: The correct answer is 2. Secure Remote Access Quiz. A: The correct answer is 2. 7. Q36: You receive the following email which contains "This message was sent from a trusted sender" in the body. This is a malicious email to steal your Hyundai password. Click this link to claim your prize”, what should you do? A: The correct answers are 3 and 5. So you think you are cyber-savvy knowledgeable in the cyber security risks you face every day in the digital world? Your Internet Service Provider will still know which websites you visit. Q32: The person who performs a social engineering attack is known as? Never give in to criminals trying to extort you. Which of the following is a good netiquette? A: The correct answer is 2. Remember, enterprise information awareness training is a great way to keep end users up to date. Patching your system is also one way to preventing new exploits from dropping off payloads. 10. Test your knowledge on cyber security awareness knowledge by taking an interactive quiz. If you reuse passwords across different sites a hack of one website can result in attackers using this stolen username and password to gain access to your accounts for another website. There's no context or previous contact with the sender, The email contains a sense of urgency to get a particular action done, Don’t proceed by clicking on the link in SMS. +44 (0)330 390 0805. Ans: Trojan.Skelky A: The correct answer is 1. If your password is stolen in a hack of 1 site user can use that to gain acces to your accounts on other sites. Question 1. Q42: Is it a good idea to pay criminals that encrypted the files on your computer by deploying so called ransomware? Passwords should be long enough, minimum 12 or 14 characters is recommended. Solutions to InfyTQ Assignments, quiz and tests. You wouldn't suspect a supplier or vendor to send a renewal link via SMS. A: The correct answer is 3. Yes, because you can be sure you will regain access to your files.  3. While visiting your favorite website for downloading the Firefox browser, a popup appears that says “You just won 100,000 US dollars! Q15: Which of the following are considered personal data under GDPR (more than 1 answer possible)? A: The correct answer is 4. There is no registration required. 1qaz2wsx seems random but it's the first 2 columns of a qwerty keyboard and also commonly used. Pick it up, don't plug it in but inform your IT department because this could be a USB device containing malware to infect your company's systems. Infosys Percentages Questions and Answers Quiz – 1. Select all applicable answers. If something is too good to be true it just isn't true. End User Information Security Awareness Quiz. Physical Security Quiz. Q28: If you suddenly see the following page in the browser, is it a good idea to claim your present? Because you spread the backups over 2 geographically different regions, which makes your backup strategy more resilient. Are apps stealing company secrets? It's very convenient after all. Get the latest news, updates & offers straight to your inbox. A: The correct answer is 1. Q10: Is it generally considered safe to use Starbucks Public Wi-Fi network for performing an online banking operation? Malicious sites can also run over https and security seals can be easily faked. Launch DDoS (Distributed Denial of Service) attacks into that website with the help of your friends if you can’t hack it in order to take it offline then post it in Facebook or      Twitter. What should you do? Phishing Quiz. A: The correct answer is 2. Scold your friend and explain to him or her that this could destroy your reputation. There are 10 questions for this security awareness quiz. Install antivirus software, then click the link. Q1: Which of the following three is the strongest password? Q12: Which of the following statements are correct? It's not a good idea to postpone operating system updates because they often contain fixes for security vulnerabilities. A: The correct answer is 2. Contact your local Computer Emergency Response / Readiness Team because it may contain malicious software. Time to update your cybersecurity policy? Q25: Is the following statement true or false. This is a useful quick quiz to gauge your basic understanding of phishing awareness Even if you recognize the number it could be spoofed by an attacker. Q27: Imagine you work for the finance department of a company. If Hyundai would ask you to reset your password the mail would come from an official Hyundai.com email address. #TangoDown! Also make sure you have working backups in place. Security Awareness Quiz Questions Category Question Answer General Security 1. If you wait with installing these updates attackers might use these vulnerabilities to gain access to your device and infect it with malware and/or steal your data. Some of the questions concerning to verbal are: - Q7: If you want to share a password with someone, what's the best option? This is a random password and thus the most secure one. They'll also have access to all the apps on your phone and your email account which contains a treasure trove of information and which can be used to reset the password for all accounts that you registered with this email address. In order to expedite it you need to? This is a bad idea, this is a scam to steal my personal data, The address of the website starts with 'https://', There's a seal on the website that says '100% secure', Do a bit of research to see whether the site has a good reputation, Read on the website and look for positive reviews of other customers, When I lose it all my information and apps are accessible by the finder, When I leave my phone unattended, miscreants can gain access to all my online accounts using my email address, When my phone gets stolen the thieves can access all my information and apps. Vendor Security Quiz. Passwords should also be random because attackers will have giant lists of predictable passwords they can use to crack passwords or gain access to your online accounts. A: The correct answer is 3. When you have no pin code on your device and you leave it unattended, lose it or when it gets stolen an unauthorized user can gain access to your personal data. Q34: Which URL(s) bring(s) you to Google’s Home Page? Download software from trusted sources only, Install an antivirus program and a two-way firewall, Always update your PC when prompted for system updates, Install Wireshark to monitor and analyze the traffic of your network. phone) - which should be defined in a procedure - you should execute the transaction. Length [Updated 2021], NSA report: Indicators of compromise on personal networks, What senior citizens need to know about security awareness, Back up your backups: How this school outsmarted a ransomware attack, Securing the home office: Printer security risks (and mitigations), Top 6 ransomware strains to watch out for in 2020, 55 federal and state regulations that require employee security awareness and training, Business email compromise (BEC) scams level up: How to spot the most sophisticated BEC attacks, Brand impersonation attacks targeting SMB organizations, How to avoid getting locked out of your own account with multi-factor authentication, How to find weak passwords in your organization’s Active Directory, How hackers use CAPTCHA to evade automated detection, The State of Ransomware 2020: Key findings from Sophos & Malwarebytes, Monitoring business communication tools like Slack for data infiltration risks, Breached passwords: The most frequently used and compromised passwords of the year. For instance attackers might hosts a malicious site on the domain http://mircosoft.com which will be incidentally visited by a lot of people. A: The correct answer is 5. The correct answer is 2. What's the most secure action? Moreover, in this post, we have arranged all the Reasoning Questions along with the answers. Download Palakkad IT Quiz questions 2015. Verify your credit card if it really expired because expiration dates are placed on credit cards. If you want to learn more on how to create strong passwords, read this blog. Just untagged yourself and delete the post. You may also want to review the explanation for each answers. Q35: Which of the following URLs could NOT be used in a so called 'Typosquatting Attack'? If you want to learn more about why password reuse is a bad idea, read this article. Start a Discussion. You can refer to the Answers Section to check your answers. If you want to learn more about HTTPS read this blog. Information Security Quiz Questions and answers 2017. Additional Resources. Q24: You’re being texted that your parcel delivery will be delayed. Infosys Reasoning Questions: Aspirants who want to join with Infosys can now check this article for obtaining information about Infosys Reasoning Questions and Answers. Q23: If you receive a suspicious email, should you? You can refer to the Answers Section to check your answers. And of course downloading trusted software from trusted sources could eliminate malicious software but if that trusted site is hacked and is currently serving malware because the attacker modified most of the software then you are not safe at all. No one, even my Internet Service Provider doesn't know which site I visit. Smart device privacy concerns for businesses, Cookies: An overview of associated privacy and security risks, Vishing spikes as workforces go remote: 6 vishing prevention tips anyone can follow, Can 2FA prevent breaches? What could go wrong? If you want to learn more about it read here why password reuse is a bad idea. A: The correct answer is 3. Will you execute the transaction? A customer service representative has just called you saying that your credit card is about to expire, he or she asked you to provide your account information and personal information in order to verify your account and to renew your credit card without telling you from what bank he or she came from. Contribute to omkar98/InfyTQ-Answers development by creating an account on GitHub. These questions are not intended for security … Which of the following could help you mitigate malwares and viruses from infecting your PC? Q9: You open a website and it has a padlock in the browser bar (the lock icon in front of the URL). A: The correct answer is 3. This is clearly a spam email and like you can see in the screenshot it's also detected as such. A: The correct answer is 3. If there is a new virus in the wild, then it could miss detecting that virus. You shouldn't trust USB devices you find. A: The correct answer is 2. A: The correct answer is 2. Security Awareness Training Report: $10 Billion Market Size by 2021; Healthcare Cybersecurity Report: ... starting today. Does this mean you can trust that this email is legitimate? This field is for validation purposes and should be left unchanged. Ignore that popup and just download the Firefox browser. What does the Internet slang “LOL” mean? If not report and delete the sms. Yes, because you don't have to care about backups yourself. Q38: You receive the following invite to take a quiz. Computer Awareness Quiz cover every information present in computer awareness pdf, computer awareness books, etc.