Welcome to your Test

Phone Number
E-Mail Id
Which of the following is a proper use of email?
Which of the following is a good way to create a password?
A malicious user can rely on email or web page to launch a ____ ?
What is the most common delivery method for viruses?
Which of the following life experiences might turn a trusted user into a malicious insider except?
When receiving an email from an unknown contact that has an attachment, you should?
Instant Messaging is safer than regular email?
Which of the following is a measure for preventing a social engineering attack except?
Which of the following would be the best password?

Why is it important to have a good understanding of Information Security policies and procedures? combination?