Quiz Summary
0 of 9 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 9 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 9
1. Question
Complete the sentence. Phishing attacks are different than spearphishing, whaling, and vishing because they
CorrectIncorrect -
Question 2 of 9
2. Question
Complete the sentence. A social engineering attack that compromises public charging stations and installs malware when a portable device plugs in, is known as
CorrectIncorrect -
Question 3 of 9
3. Question
Select two good travelling habits for protecting your portable device. (Choose two.)
CorrectIncorrect -
Question 4 of 9
4. Question
Which is the number one infection vector for all kinds of malware?
CorrectIncorrect -
Question 5 of 9
5. Question
You receive an email from your bank. It states that someone has your password and that you must take immediate action by clicking the link provided. What should you do?
CorrectIncorrect -
Question 6 of 9
6. Question
Which precaution should you take if you receive an email that involves the movement of money, such as the payment of an invoice, even if it is from someone you know?
CorrectIncorrect -
Question 7 of 9
7. Question
Which three of the following activities represents data vulnerabilities on a mobile device. (Choose three.)
CorrectIncorrect -
Question 8 of 9
8. Question
Which of the following is a good habit for protecting your mobile device?
CorrectIncorrect -
Question 9 of 9
9. Question
Which three activities pose a potential security threat to users? (Choose three.)
CorrectIncorrect