Skip to main content

This is a final assessment covering all cybersecurity training modules.

Instructions

Select the best answer for each question. Review your answers using the dropdowns below.

Question 1

Which action is considered a public appearance security risk? A. Locking your laptop when stepping away B. Discussing internal work details in a public café C. Using a privacy screen D. Reporting suspicious behavior

Question 2

What is the MOST secure password practice? A. Reusing the same password everywhere B. Writing passwords down C. Using long, unique passwords with a password manager D. Sharing passwords with coworkers

Question 3

Why is Multi-Factor Authentication (MFA) important? A. It replaces passwords B. It slows down attackers C. It adds protection if a password is stolen D. It stores credentials

Question 4

Which email is MOST likely a phishing attempt? A. Internal company newsletter B. Urgent payment request with a suspicious link C. Known vendor invoice D. Calendar invite from your manager

Question 5

What should you do if you receive a suspicious email? A. Click the link to check B. Reply to the sender C. Report it and delete the email D. Forward it to coworkers

Question 6

Which action is unsafe when using devices? A. Keeping systems updated B. Locking devices when unattended C. Connecting unknown USB drives D. Using approved software

Question 7

Which is an example of sensitive data? A. Marketing materials B. Office location C. Personally Identifiable Information (PII) D. Public job postings

Question 8

What is the safest remote work practice? A. Using public Wi-Fi without protection B. Sharing work devices with family C. Using secure Wi-Fi and a company VPN D. Disabling updates

Question 9

Which secure coding practice prevents injection attacks? A. Hardcoding credentials B. Input validation and sanitization C. Ignoring error messages D. Using outdated libraries

Question 10

What is the best cybersecurity mindset? A. Security is only IT’s job B. Fix security later C. Stay alert and follow security policies D. Assume systems won’t be attacked

Question 11

Which social media action can create a cybersecurity risk? A. Keeping your profile private B. Posting screenshots of internal systems C. Ignoring friend requests D. Reporting suspicious messages

Question 12

What should you do if you receive an unexpected MFA prompt? A. Approve it quickly B. Ignore it C. Report it immediately D. Change devices

Question 13

Why is public Wi-Fi risky without protection? A. It is slower B. It costs money C. Attackers can intercept unencrypted traffic D. It blocks VPNs

Question 14

What is the correct way to handle confidential data? A. Store it on personal devices B. Share it if requested C. Access only when required and store it securely D. Email it without protection

Question 15

Which coding practice helps reduce software vulnerabilities? A. Skipping code reviews B. Using outdated libraries C. Performing security-focused code reviews D. Disabling input validation

✅ Completion Criteria

  • 12–15 correct answers: Pass
  • Below 12: Review training modules and retry
🎉 Congratulations on completing the cybersecurity training!