Information Security Awareness Course's Assessment

Hi there! Welcome to Information Security Awareness Course's Assessment. This assessment consists of 15 questions and you will be given 35 minutes to complete it (5 minutes for reading the instructions and filling in your name and 2 minutes for each question). You only have one attempt at this assessment, so please think carefully before submitting the assessment. This assessment will contribute 30% to the total of your course grades and you need to get a minimum score of 15 from a maximum of 20 scores that you can possibly get (you need a 75% grade to pass this assessment). You are not allowed to use mobile phones to do the assessment, you should use a laptop with Zoom Cloud Meetings installed.
Hi there! Welcome to Information Security Awareness Course's Assessment. This assessment consists of 15 questions and you will be given 35 minutes to complete it (5 minutes for reading the instructions and filling in your name and 2 minutes for each question). You only have one attempt at this assessment, so please think carefully before submitting the assessment. This assessment will contribute 30% to the total of your course grades and you need to get a minimum score of 15 from a maximum of 20 scores that you can possibly get (you need a 75% grade to pass this assessment). You are not allowed to use mobile phones to do the assessment, you should use a laptop with Zoom Cloud Meetings installed.
Please fill in your name below:
I will take this assessment honestly
What is not a principle of information security awareness?
Confidentiality
Public
Integrity
Availability
Information Security Awareness is the responsibility of...
Top Management Only
The ICT Team
The Information Security Team
All Employees
One example of the impact of information security disturbance?
Financial loss
Financial benefit
Stakeholder's confidence
Benefit from intellectual property
Please select every possible impact of information security disturbance! (multiple answer)
Disruption of operational activities
Reputation loss
Information Leakage
Employees strike
Which one is not a type of classification of information assets and confidentiality of information?
Please choose the right thing to do to secure physical environment... (multiple answer)
Do not share access to work area
The work area must be protected from hazardous and flammable objects
Beware of “tailgating”
Change email password frequently
Why should we be aware of information security? (multiple answer)
The increasing trend of information security threats in the world, for example cyber attacks are increasingly sophisticated and massive, ransomware attacks every 14 seconds in 2019
The high value of financial transactions with the government makes the government a target for cyber attacks
We can ignore the importance of information security
The increasing trend of burglary
Please choose the one that are not considered a computer security...
Turn off the computer when leaving the office
Be aware of shoulder surfing, which is a direct observation method by peering to get information
Do not use Removable Media (e.g. DVD, external HDD or USB) which is unknown to the user's device
Paths in and out of the work area must be maintained and monitored
Please choose which one is considered things that included password management... (multiple answer)
Use a password with the following criteria: Minimum 8 characters, Combination: capital letters, lowercase letters and numbers (0 – 9)
Change the password regularly, maximum within 180 days or in the event that the password is known to others
Keeping Password confidential
Keeping notes of the password on a sticky note and put it on the PC monitor
Things that are not prohibited in the use of passwords?
One of the impact of information security disturbance is social credit loss
True
False
The government depends highly on business processes on ICT, if there is a disruption to ICT, the government business activities will be disrupted.
True
False
The development of technology is growing rapidly, causing an increase in cyber crime.
True
False
Paths in and out of the work area must be maintained and monitored is one of the computer security protocol
True
False
Protecting organizational data and information from disclosure by unauthorized persons is a definition of confidentiality
True
False
{"name":"Information Security Awareness Course's Assessment", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Hi there! Welcome to Information Security Awareness Course's Assessment. This assessment consists of 15 questions and you will be given 35 minutes to complete it (5 minutes for reading the instructions and filling in your name and 2 minutes for each question). You only have one attempt at this assessment, so please think carefully before submitting the assessment. This assessment will contribute 30% to the total of your course grades and you need to get a minimum score of 15 from a maximum of 20 scores that you can possibly get (you need a 75% grade to pass this assessment). You are not allowed to use mobile phones to do the assessment, you should use a laptop with Zoom Cloud Meetings installed., Please fill in your name below:, I will take this assessment honestly","img":"https://www.quiz-maker.com/3012/CDN/76-3539543/isa-removebg-preview.png?sz=1200-00464006930844413059"}
Make your own Survey
- it's free to start.