Welcome to your Test

Phone Number
E-Mail Id

Which of the following is a proper use of email?

Which of the following is a good way to create a password?

What is the most common delivery method for viruses?

Which of the following life experiences might turn a trusted user into a malicious insider except?

Which of the following would be the best password?

Which of the following is a measure for preventing a social engineering attack except?

When receiving an email from an unknown contact that has an attachment, you should?

Why is it important to have a good understanding of Information Security policies and procedures? combination?

A malicious user can rely on email or web page to launch a ____ ?

Instant Messaging is safer than regular email?