Quiz Summary
0 of 24 questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 24 questions answered correctly
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
-
Oops! You did not pass.
Thank you for participating.
-
Congratulations! You successfully passed.
Thank you for completing.
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 24
1. Question
Watch the scenario and answer the question below.
While browsing the internal file sharing drive in her company, Jennifer notices that she has access to a folder containing confidential business data. However, she does not have any business reasons to have access to such data. What must she do?
CorrectIncorrect -
Question 2 of 24
2. Question
While searching for information in an online group, you find a business document with confidential data belonging to your organisation. What must you do?
CorrectIncorrect -
Question 3 of 24
3. Question
Harry uses his personal mobile device to access business documents. His phone is not configured with antivirus software. What risks does his organisation face when he accesses the corporate data and network using this unsecured device?
CorrectIncorrect -
Question 4 of 24
4. Question
Watch the video and answer the question below.
Robert uses his personal mobile device extensively for business email communications. He wants to download an app for his personal use. What precautions must he consider?
CorrectIncorrect -
Question 5 of 24
5. Question
Listen to Helen’s advice to Michael and answer the question below.
Do you agree with Helen?
CorrectIncorrect -
Question 6 of 24
6. Question
Unauthorised access and disclosure of sensitive data could affect the privacy of an individual.
CorrectIncorrect -
Question 7 of 24
7. Question
Watch the video and answer the question below.
Which of the following cybersecurity practices must Alexa consider while sending an email to an external party?
CorrectIncorrect -
Question 8 of 24
8. Question
Watch the scenario and answer the question below.
Olivia is in a cafe. She receives an email from a client requesting for an important file. The size of the file is more than the allowed attachment size limit of her official email. What are the best possible options to send the file?
CorrectIncorrect -
Question 9 of 24
9. Question
Watch the video and answer the question below.
Jake is new to the organisation. Can you help him to identify the Internet-related activities that may harm his organisation?
CorrectIncorrect -
Question 10 of 24
10. Question
You have inadvertently opened a web page while browsing the Internet. Now your device is behaving strangely. What are the immediate steps you should take?
CorrectIncorrect -
Question 11 of 24
11. Question
As a diligent employee, which of the following cybersecurity practices will you adopt to prevent malware infection?
CorrectIncorrect -
Question 12 of 24
12. Question
Watch the video and answer the question below.
Brad received an email which looked like it was sent from the IT helpdesk of his organisation. On clicking the link in the email, his system was locked by ransomware. What should be his next course of action?
CorrectIncorrect -
Question 13 of 24
13. Question
Watch this video and answer the question.
Danny uses his mobile device often for business. He is installing a new app that is asking for some permissions. Can you help him?
CorrectIncorrect -
Question 14 of 24
14. Question
Watch this video and answer the question below.
Ann is planning her vacation in France. She downloads a free translation app from outside the official app store of the mobile device manufacturer. What could be the possible risks?
CorrectIncorrect -
Question 15 of 24
15. Question
Watch the video and answer the question below.
What should be William’s best action?
CorrectIncorrect -
Question 16 of 24
16. Question
Watch the video and answer the question below.
What should her response be?
CorrectIncorrect -
Question 17 of 24
17. Question
Which of the below is a phishing email?
CorrectIncorrect -
Question 18 of 24
18. Question
Watch the video and answer the question below.
Choose the tell-tale signs that indicate this is probably a phishing email.
CorrectIncorrect -
Question 19 of 24
19. Question
Steve is having a conversation with Ria. Watch the video and choose the best answer.
What should Ria’s response be?
CorrectIncorrect -
Question 20 of 24
20. Question
A vendor has sent you a USB memory stick in the post which contains important files of a new project. What should be your next course of action?
CorrectIncorrect -
Question 21 of 24
21. Question
Watch the video and answer the question below.
Eric is going offshore for a business meeting. He is at the airport and has taken his official laptop along with him. Do you suspect a security incident here?
CorrectIncorrect -
Question 22 of 24
22. Question
You are on a business trip and waiting for a flight at the airport. Your mobile data has expired, and you find a few Wi-Fi hotspots. Choose the options below that will provide a higher level of security when connecting to open Wi-Fi hotspots.
CorrectIncorrect -
Question 23 of 24
23. Question
Watch the video and answer the question below.
What are the security weaknesses that are visible?
CorrectIncorrect -
Question 24 of 24
24. Question
You enter a meeting room and find that the team, from the previous meeting, have left a document with the title ‘Profit forecast – Third Quarter’ on the table. On the whiteboard, there is information which you are not authorised to view. What do you do?
CorrectIncorrect