This is a final assessment covering all cybersecurity training modules.
Instructions
Select the best answer for each question. Review your answers using the dropdowns below.Question 1
Which action is considered a public appearance security risk? A. Locking your laptop when stepping away B. Discussing internal work details in a public café C. Using a privacy screen D. Reporting suspicious behaviorQuestion 2
What is the MOST secure password practice? A. Reusing the same password everywhere B. Writing passwords down C. Using long, unique passwords with a password manager D. Sharing passwords with coworkersQuestion 3
Why is Multi-Factor Authentication (MFA) important? A. It replaces passwords B. It slows down attackers C. It adds protection if a password is stolen D. It stores credentialsQuestion 4
Which email is MOST likely a phishing attempt? A. Internal company newsletter B. Urgent payment request with a suspicious link C. Known vendor invoice D. Calendar invite from your managerQuestion 5
What should you do if you receive a suspicious email? A. Click the link to check B. Reply to the sender C. Report it and delete the email D. Forward it to coworkersQuestion 6
Which action is unsafe when using devices? A. Keeping systems updated B. Locking devices when unattended C. Connecting unknown USB drives D. Using approved softwareQuestion 7
Which is an example of sensitive data? A. Marketing materials B. Office location C. Personally Identifiable Information (PII) D. Public job postingsQuestion 8
What is the safest remote work practice? A. Using public Wi-Fi without protection B. Sharing work devices with family C. Using secure Wi-Fi and a company VPN D. Disabling updatesQuestion 9
Which secure coding practice prevents injection attacks? A. Hardcoding credentials B. Input validation and sanitization C. Ignoring error messages D. Using outdated librariesQuestion 10
What is the best cybersecurity mindset? A. Security is only IT’s job B. Fix security later C. Stay alert and follow security policies D. Assume systems won’t be attackedQuestion 11
Which social media action can create a cybersecurity risk? A. Keeping your profile private B. Posting screenshots of internal systems C. Ignoring friend requests D. Reporting suspicious messagesQuestion 12
What should you do if you receive an unexpected MFA prompt? A. Approve it quickly B. Ignore it C. Report it immediately D. Change devicesQuestion 13
Why is public Wi-Fi risky without protection? A. It is slower B. It costs money C. Attackers can intercept unencrypted traffic D. It blocks VPNsQuestion 14
What is the correct way to handle confidential data? A. Store it on personal devices B. Share it if requested C. Access only when required and store it securely D. Email it without protectionQuestion 15
Which coding practice helps reduce software vulnerabilities? A. Skipping code reviews B. Using outdated libraries C. Performing security-focused code reviews D. Disabling input validation✅ Completion Criteria
- 12–15 correct answers: Pass
- Below 12: Review training modules and retry