Skip to content
  • FAQ
  • Request a Demo
  • Community
  • Login / Sign-up
Security Quotient Logo Security Quotient Logo Security Quotient Logo
  • Training
  • Solutions
  • Custom-made
  • Get Pricing
  • Contact
  • Training
  • Solutions
  • Custom-made
  • Contact
  • Login/ Sign-up

Assessment

Let us take the assessment Assessment
Time limit: 0

Quiz Summary

0 of 24 questions completed

Questions:

Information

You have already completed the quiz before. Hence you can not start it again.

Quiz is loading…

You must sign in or sign up to start the quiz.

You must first complete the following:

Results

Quiz complete. Results are being recorded.

Results

0 of 24 questions answered correctly

Time has elapsed

You have reached 0 of 0 point(s), (0)

Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)

Categories

  1. Not categorized 0%
  • Oops! You did not pass.

    Thank you for participating.

  • Congratulations! You successfully passed.

    Thank you for completing.

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  22. 22
  23. 23
  24. 24
  1. Current
  2. Review
  3. Answered
  4. Correct
  5. Incorrect
  1. Question 1 of 24
    1. Question

    Watch the scenario and answer the question below.

    https://dojo.securityquotient.io/wp-content/uploads/2020/11/Data-Privacy.mp4

    While browsing the internal file sharing drive in her company, Jennifer notices that she has access to a folder containing confidential business data. However, she does not have any business reasons to have access to such data. What must she do?​

    Correct

    Incorrect

  2. Question 2 of 24
    2. Question

    While searching for information in an online group, you find a business document with confidential data belonging to your organisation. What must you do?​

    Correct

    Incorrect

  3. Question 3 of 24
    3. Question

    Harry uses his personal mobile device to access business documents. His phone is not configured with antivirus software. What risks does his organisation face when he accesses the corporate data and network using this unsecured device? 

    Correct

    Incorrect

  4. Question 4 of 24
    4. Question

    Watch the video and answer the question below.

    https://dojo.securityquotient.io/wp-content/uploads/2020/11/BYOD-1.mp4

    Robert uses his personal mobile device extensively for business email communications. He wants to download an app for his personal use. What precautions must he consider?

    Correct

    Incorrect

  5. Question 5 of 24
    5. Question

    Listen to Helen’s advice to Michael and answer the question below.

    https://dojo.securityquotient.io/wp-content/uploads/2020/11/Data-Storage.mp4

    Do you agree with Helen?

    Correct

    Incorrect

  6. Question 6 of 24
    6. Question

    Unauthorised access and disclosure of sensitive data could affect the privacy of an individual.

    Correct

    Incorrect

  7. Question 7 of 24
    7. Question

    Watch the video and answer the question below.

    https://dojo.securityquotient.io/wp-content/uploads/2020/11/Email-Security-Scenario1.mp4

    Which of the following cybersecurity practices must Alexa consider while sending an email to an external party?​

    Correct

    Incorrect

  8. Question 8 of 24
    8. Question

    Watch the scenario and answer the question below.

    https://dojo.securityquotient.io/wp-content/uploads/2020/11/Email-Security-Scenario2.mp4

    Olivia is in a cafe. She receives an email from a client requesting for an important file. The size of the file is more than the allowed attachment size limit of her official email. What are the best possible options to send the file? 

    Correct

    Incorrect

  9. Question 9 of 24
    9. Question

    Watch the video and answer the question below.

    https://dojo.securityquotient.io/wp-content/uploads/2020/11/Internet-Security-Scenario2.mp4

    Jake is new to the organisation. Can you help him to identify the Internet-related activities that may harm his organisation?

    Correct

    Incorrect

  10. Question 10 of 24
    10. Question

    You have inadvertently opened a web page while browsing the Internet. Now your device is behaving strangely. What are the immediate steps you should take?

    Correct

    Incorrect

  11. Question 11 of 24
    11. Question

    As a diligent employee, which of the following cybersecurity practices will you adopt to prevent malware infection? 

    Correct

    Incorrect

  12. Question 12 of 24
    12. Question

    Watch the video and answer the question below.

    https://dojo.securityquotient.io/wp-content/uploads/2020/11/Malware.mp4

    Brad received an email which looked like it was sent from the IT helpdesk of his organisation. On clicking the link in the email, his system was locked by ransomware. What should be his next course of action?

    Correct

    Incorrect

  13. Question 13 of 24
    13. Question

    Watch this video and answer the question.

    https://dojo.securityquotient.io/wp-content/uploads/2020/12/Mobile-Device-Security-Scenario1.mp4

    Danny uses his mobile device often for business. He is installing a new app that is asking for some permissions. Can you help him?

    Correct

    Incorrect

  14. Question 14 of 24
    14. Question

    Watch this video and answer the question below.

    https://dojo.securityquotient.io/wp-content/uploads/2020/12/Mobile-Device-Security-Scenario3.mp4

    Ann is planning her vacation in France. She downloads a free translation app from outside the official app store of the mobile device manufacturer. What could be the possible risks?

    Correct

    Incorrect

  15. Question 15 of 24
    15. Question

    Watch the video and answer the question below.

    https://dojo.securityquotient.io/wp-content/uploads/2020/12/Password-Security-Scenario-1.mp4

    What should be William’s best action?

    Correct

    Incorrect

  16. Question 16 of 24
    16. Question

    Watch the video and answer the question below.

    https://dojo.securityquotient.io/wp-content/uploads/2020/12/Password-Security-Scenario-2.mp4

    What should her response be?

    Correct

    Incorrect

  17. Question 17 of 24
    17. Question

    Which of the below is a phishing email? 

    Correct

    Incorrect

  18. Question 18 of 24
    18. Question

    Watch the video and answer the question below.

    https://dojo.securityquotient.io/wp-content/uploads/2020/12/Phishing.mp4

    Choose the tell-tale signs that indicate this is probably a phishing email.

    Correct

    Incorrect

  19. Question 19 of 24
    19. Question

    Steve is having a conversation with Ria. Watch the video and choose the best answer.

    https://dojo.securityquotient.io/wp-content/uploads/2020/12/Removable-Media-Usage-Scenario2.mp4

    What should Ria’s response be?​

    Correct

    Incorrect

  20. Question 20 of 24
    20. Question

    A vendor has sent you a USB memory stick in the post which contains important files of a new project. What should be your next course of action?

    Correct

    Incorrect

  21. Question 21 of 24
    21. Question

    Watch the video and answer the question below.

    https://dojo.securityquotient.io/wp-content/uploads/2020/12/While-Travelling.mp4

    Eric is going offshore for a business meeting. He is at the airport and has taken his official laptop along with him. Do you suspect a security incident here?

    Correct

    Incorrect

  22. Question 22 of 24
    22. Question

    You are on a business trip and waiting for a flight at the airport. Your mobile data has expired, and you find a few Wi-Fi hotspots. Choose the options below that will provide a higher level of security when connecting to open Wi-Fi hotspots. 

    Correct

    Incorrect

  23. Question 23 of 24
    23. Question

    Watch the video and answer the question below.

    https://dojo.securityquotient.io/wp-content/uploads/2020/12/Workdesk.mp4

    What are the security weaknesses that are visible?

    Correct

    Incorrect

  24. Question 24 of 24
    24. Question

    You enter a meeting room and find that the team, from the previous meeting, have left a document with the title ‘Profit forecast – Third Quarter’ on the table. On the whiteboard, there is information which you are not authorised to view. What do you do? 

    Correct

    Incorrect

By Security Quotient|December 21, 2020|

Integrated human factor cyber security risk assessment, behaviour training and deep analytics platform.

Company

About Us

Clients

Careers

Terms and Conditions

Privacy Policy

Sitemap

Products

Training Solutions

Training Platform

Custom-made

Multilingual

For Differently-Abled

Help and Contact

FAQ

Get Pricing

Request a Demo

Contact Support

Contact HR

Connect with us

Community

Blog

The Human Factor Radar

Subscribe
© 2020 Security Quotient Pvt Ltd. Security Quotient is a Registered Trademark of Security Quotient Pvt. Ltd.
We use cookies to tailor your experience, measure site performance and to remember your preferences. By clicking the ‘Accept’ button, you agree that cookies can be placed in accordance with our privacy policy. Accept