Test

Welcome to your Test

Name
Phone Number
E-Mail Id

Why is it important to have a good understanding of Information Security policies and procedures? combination?

Which of the following life experiences might turn a trusted user into a malicious insider except?

Which of the following is a proper use of email?

A malicious user can rely on email or web page to launch a ____ ?

Instant Messaging is safer than regular email?

Which of the following would be the best password?

When receiving an email from an unknown contact that has an attachment, you should?

Which of the following is a measure for preventing a social engineering attack except?

Which of the following is a good way to create a password?

What is the most common delivery method for viruses?