Test

Welcome to your Test

Name
Phone Number
E-Mail Id
What is the most common delivery method for viruses?
Which of the following is a proper use of email?
Which of the following is a measure for preventing a social engineering attack except?
Instant Messaging is safer than regular email?
A malicious user can rely on email or web page to launch a ____ ?

Why is it important to have a good understanding of Information Security policies and procedures? combination?

When receiving an email from an unknown contact that has an attachment, you should?
Which of the following life experiences might turn a trusted user into a malicious insider except?
Which of the following would be the best password?
Which of the following is a good way to create a password?