Information Security Training Quiz! Trivia

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Jfey2006
J
Jfey2006
Community Contributor
Quizzes Created: 1 | Total Attempts: 184
Questions: 10 | Attempts: 184

SettingsSettingsSettings
Information Security Training Quiz! Trivia - Quiz


Welcome to the Information Security Training Quiz! Specific rules and procedures are put in place when using computer artwork, and it is essential for employees to know what they have access to and don’t. How do you ensure that the password you have set for your computer is safe, and do you know how to note suspicious emails sent to you? This quiz will help find out how secure your information is.


Questions and Answers
  • 1. 

    Individually Identifiable Information includes things like Name, Date of Birth, Phone Number, E-Mail Address, Health Information, and Social Security Number.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    True, our customer's information is one of our most valuable assets!

    Rate this question:

  • 2. 

    HIPAA infractions can include not only financial penalties on the corporation but on the individual involved as well. If the violation was wrongful or negligent disclosure, the individual can also face jail time.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    True, HIPAA violations can even mean jail time in some cases.

    Rate this question:

  • 3. 

    Identity thieves deploy various techniques to try and steal customer information including but not limited too: phishing, social engineering, and network attacks.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    True, other techniques include dumpster diving, theft, and network attacks.

    Rate this question:

  • 4. 

    Phishing is a special way of catching fish in Philadelphia.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    False, phishing is a technique used by identity thieves where they send out emails requesting information on potential targets in hopes that company personnel will provide it.

    Rate this question:

  • 5. 

    Spear Phishing is when identity thieves craft a sophisticated phishing email that appears to come from your employer, typically someone in HR or the IT departments.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    True, this technique is more widely used than ever before.

    Rate this question:

  • 6. 

    Social Engineering is an easy way for identity thieves to try and extract information from the company's front line personnel.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    True, the easiest way to get information...is to ask!

    Rate this question:

  • 7. 

    Some of the tools companies use to protect their organizations from identity thieves include things like firewalls, shred bins, monitor shades, and policies and procedures; but does not include annual training like this test.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    False, annual information security training is a critical part of any information security program.

    Rate this question:

  • 8. 

    The most valuable tools against identity thieves are firewalls.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    False, the most valuable tool against identity thieves is a well trained and alert staff.

    Rate this question:

  • 9. 

    Strong Passwords have 6 characters, one number, and one capital letter.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    False, strong passwords have 8 characters and at least 1 upper case letter, 1 lower case letter, 1 number, and 1 special character. In addition, they are not a dictionary word or a formal name.

    Rate this question:

  • 10. 

    If a suspicious email is forwarded to you the best thing to do is notify IT Support and not forward the email to anyone as it could contain a virus or malicious code that could harm other PCs or the network itself.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    True, whenever in doubt always notify IT support, they armed with the tools to look at the email and see what types of threats could be embedded within.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 08, 2010
    Quiz Created by
    Jfey2006
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.