User Information
Why is cybersecurity essential?
*
What is the role of employees in maintaining cybersecurity?
*
Which of the following is a sign of a phishing email?
*
What is spear-phishing?
*
What is social engineering?
*
Which type of malware encrypts a user’s data and demands a ransom?
*
What is an insider threat?
*
How can you recognize an insider threat?
*
What was a significant impact of the WannaCry ransomware attack?
*
How can organizations protect against ransomware attacks?
*
What is the primary goal of a phishing simulation?
*
What should you do if you suspect a data breach?
*
What is a key benefit of using multi-factor authentication (MFA)?
*
Which of the following is a secure practice for handling passwords?
*
What is a common sign of a suspicious link in an email?
*
Why is social media security important?
*
What is a risk of using public Wi-Fi networks?
*
What is the best practice for securing Wi-Fi connections?
*
How should sensitive information be shared securely?
*
What is the purpose of incident reporting?
*
What is a common sign of a malware infection?
*
What should be included in an incident response plan?
*
What does GDPR stand for?
*
What is the main focus of HIPAA?
*
What does CCPA stand for?
*
What is a common best practice for maintaining compliance?
*
What should you do if you receive a suspicious email attachment?
*
What is a key benefit of secure data handling practices?
*
How can employees contribute to maintaining security in their roles?
*
What is an example of a role-specific security challenge for finance staff?
*
How can employees safely handle data when working remotely?
*
What is a typical response to a confirmed data breach?
*
Why is regular employee training important for cybersecurity?
*
What should you do if you encounter a suspicious social media request?
*
What is the primary purpose of network firewalls?
*
What is a common vulnerability in unsecured networks?
*
What is the key benefit of using password managers?
*
What is a typical sign of a compromised network device?
*
How should sensitive information be encrypted?
*
What is a key feature of secure Wi-Fi networks?
*
What is the best practice for reporting cybersecurity incidents?
*
Why should employees be aware of compliance regulations?
*
To monitor and control incoming and outgoing network traffic based on security rules is the primary focus of this network device?
*