Skip to main contentThis is a final assessment covering all cybersecurity training modules.
Instructions
Select the best answer for each question.
Review your answers using the dropdowns below.
Question 1
Which action is considered a public appearance security risk?
A. Locking your laptop when stepping away
B. Discussing internal work details in a public café
C. Using a privacy screen
D. Reporting suspicious behavior
Question 2
What is the MOST secure password practice?
A. Reusing the same password everywhere
B. Writing passwords down
C. Using long, unique passwords with a password manager
D. Sharing passwords with coworkers
Question 3
Why is Multi-Factor Authentication (MFA) important?
A. It replaces passwords
B. It slows down attackers
C. It adds protection if a password is stolen
D. It stores credentials
Question 4
Which email is MOST likely a phishing attempt?
A. Internal company newsletter
B. Urgent payment request with a suspicious link
C. Known vendor invoice
D. Calendar invite from your manager
Question 5
What should you do if you receive a suspicious email?
A. Click the link to check
B. Reply to the sender
C. Report it and delete the email
D. Forward it to coworkers
Question 6
Which action is unsafe when using devices?
A. Keeping systems updated
B. Locking devices when unattended
C. Connecting unknown USB drives
D. Using approved software
Question 7
Which is an example of sensitive data?
A. Marketing materials
B. Office location
C. Personally Identifiable Information (PII)
D. Public job postings
Question 8
What is the safest remote work practice?
A. Using public Wi-Fi without protection
B. Sharing work devices with family
C. Using secure Wi-Fi and a company VPN
D. Disabling updates
Question 9
Which secure coding practice prevents injection attacks?
A. Hardcoding credentials
B. Input validation and sanitization
C. Ignoring error messages
D. Using outdated libraries
Question 10
What is the best cybersecurity mindset?
A. Security is only IT’s job
B. Fix security later
C. Stay alert and follow security policies
D. Assume systems won’t be attacked
Question 11
Which social media action can create a cybersecurity risk?
A. Keeping your profile private
B. Posting screenshots of internal systems
C. Ignoring friend requests
D. Reporting suspicious messages
Question 12
What should you do if you receive an unexpected MFA prompt?
A. Approve it quickly
B. Ignore it
C. Report it immediately
D. Change devices
Question 13
Why is public Wi-Fi risky without protection?
A. It is slower
B. It costs money
C. Attackers can intercept unencrypted traffic
D. It blocks VPNs
Question 14
What is the correct way to handle confidential data?
A. Store it on personal devices
B. Share it if requested
C. Access only when required and store it securely
D. Email it without protection
Question 15
Which coding practice helps reduce software vulnerabilities?
A. Skipping code reviews
B. Using outdated libraries
C. Performing security-focused code reviews
D. Disabling input validation
✅ Completion Criteria
- 12–15 correct answers: Pass
- Below 12: Review training modules and retry
🎉 Congratulations on completing the cybersecurity training!