Test

Welcome to your Test

Name
Phone Number
E-Mail Id
Which of the following life experiences might turn a trusted user into a malicious insider except?
A malicious user can rely on email or web page to launch a ____ ?
Which of the following is a good way to create a password?
Which of the following would be the best password?
Which of the following is a proper use of email?

Why is it important to have a good understanding of Information Security policies and procedures? combination?

When receiving an email from an unknown contact that has an attachment, you should?
Instant Messaging is safer than regular email?
Which of the following is a measure for preventing a social engineering attack except?
What is the most common delivery method for viruses?