SlideShare uma empresa Scribd logo
1 de 2
Baixar para ler offline
Find out just how savvy you are about Internet security and protecting your company’s (and customer’s) data.
Test Your Internet Security IQ
1.	 It’s okay to share passwords with: (Check all that apply.)
¨ Your boss	 ¨ Your spouse
¨ The hotel manager	 ¨ Your coworker
¨ Human Resources	 ¨ None of the above
2.	 Don’t put confidential business information in email,
instant (IM), or text messages; they may not be secure.
a. True	 b. False
3.	 Which of the following is a strong password? (Check
all that apply.)
¨ Password1	 ¨ R3dHairH@rse$ky
¨ Your pet’s name	 ¨ 135791113
¨ The first letters of each word in a saying, phrase, or
other sentence that’s easy for you to remember.
4.	 If you see a pop-up message like this when you’re on
the web, you should:
a. Click OK to decide whether it’s a legitimate offer.
b. Click Cancel.
c. Click the button.
d. Press Ctrl + F4 on your keyboard to close it.
5.	 If you use a public Wi-Fi network (in a café or hotel,
for example) that assigns you a password, it’s okay to
send confidential business data.
a. True	 b. False
6.	 How can you help protect data when you’re on the
road?
a. Lock your laptop and mobile phone with strong passwords
and PINs.
b. Encrypt sensitive data on all smartphones, laptops, flash
drives, and other portable devices.
c. Make sure the public Wi-Fi connection encrypts data.
d. All of the above.
7.	 This was a fraudulent phishing message from
“Microsoft” to an Outlook user. Give two warning
signs that it’s a hoax.
Due to the congestion in all Outlook.com users, Outlook
would shut down all unused accounts. Confirm your E-mail
by filling out your Login Infromation below or your account
will be suspended within 24 hours for security reasons .
* Username:
* Password:
* Date of Birth:
* Country Or Territory:
Warning!!! Account owner that refuses to update his/her
account after two weeks of receiving this warning will lose
his or her account permanently.
All The best,
The Outlook.com Team
Verify your Account now To Avoid It Closed
MorHezi78@adatum.com
Confirm our outlook account services.
Verify your account now to avoid it closed!!
Dear Account User:
1. 	
2. 	
8.	 If you get email or an IM from a manager within
your organization asking for sensitive personal
information (like a password or your Social Security
number), it’s okay to supply it.
a. True	 b. False
9.	 When it comes to attachments and links in email,
instant, or text messages, which tips should you
follow?: (Check all that apply.)
¨ If the message comes from someone you know personally,
it’s okay to open or click them.
¨ Don’t open or click them if they’re out of context—for
example, ilovepinkponies.pdf from your boss.
¨ Look carefully at the link or attachment to decide if it’s safe
to click.
¨ Make sure your antivirus software is up to date.
¨ View every one with suspicion.
10.	 If you’ve installed all the security updates required
by your system administrator, you still have to
worry about viruses when you click links or open
attachments in messages.
a. True	 b. False
Answers
Smarter Online = Safer Online
1.	 None of the above. Treat your passwords with as
much care as the information they protect.
2.	 True. Avoid putting confidential information in email
unless it is encrypted, or in instant or text messages,
which are not reliably secure.
3.	 Correct:
R3dHairH@rse$ky
Uses words (RedHairHorseSky) that do not make
sense grammatically, but mean something to the
person who made up the password. Also, the
password is long and mixes capital and lowercase
letters, numbers, and symbols.
The first letters of each word in a sentence that’s
memorable to you—a line of a favorite poem, a
popular saying, etc. It’s easy for you to remember,
but difficult for others to guess.
Incorrect:
Password1: This is most common business password
and is at the top of criminal lists to test.
Your pet’s name.
135791113: Avoid sequences of numbers.
4.	 (d) Anything you can click in a pop-up message—even
the Windows Close button ( )—can be reprogrammed
to download malicious software.
5.	 False. When you use public wireless connections, it’s
safer to assume that it’s not secure, so don’t enter any
sensitive information or download software.
6.	 (d)
7.	
Due to the congestion in all Outlook.com users, Outlook
would shut down all unused accounts. Confirm your E-mail
by filling out your Login Infromation below or your account
will be suspended within 24 hours for security reasons .
* Username:
* Password:
* Date of Birth:
* Country Or Territory:
Warning!!! Account owner that refuses to update his/her
account after two weeks of receiving this warning will lose
his or her account permanently.
All The best,
The Outlook.com Team
Verify your Account now To Avoid It Closed
MorHezi78@adatum.com
Confirm our outlook account services.
Verify your account now to avoid it closed!!
Dear Account User:
Here are some of the answers you might have given:
1 A suspicious email address. (Note that the real
email address is not from Outlook.)
2 Generic salutations rather than using your name.
3 Alarmist messages. Criminals try to create a sense
of urgency so you’ll respond without thinking.
4 Grammatical errors and misspellings.
5 Requests to verify or update your account, stop
payment on a charge, and the like.
8.	 False. Someone may have broken into the corporate
network and sent email from the manager’s account.
To verify the legitimacy of the request, call the manager
using the number on your phone or contact list, not
the one in the message. If it turns out to be fraudulent,
let your IT department know.
9.	 Correct:
View every one with suspicion.
Don’t open or click them if they’re out of context.
Make sure your antivirus software is up to date.
10.	 True. Even the most effective antivirus software
cannot be 100% effective against viruses which
show up continuously.
1
2
3
4
5

Mais conteúdo relacionado

Mais procurados

How to check a suspicious link without clicking on it?
How to check a suspicious link without clicking on it?How to check a suspicious link without clicking on it?
How to check a suspicious link without clicking on it?Ankush Sarkar
 
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesTrain Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesHuman Resources & Payroll
 
Notes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyNotes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyJonathan Bacon
 
Sip 140208055023-phpapp02
Sip 140208055023-phpapp02Sip 140208055023-phpapp02
Sip 140208055023-phpapp02mark scott
 
Parent edline instructions
Parent edline instructionsParent edline instructions
Parent edline instructionssteveschawalder
 
Computer security and ethics
Computer security and ethicsComputer security and ethics
Computer security and ethicsSyed Zeeshan Ali
 
Seminar on yahoo mail cyber attack
Seminar on yahoo mail cyber attackSeminar on yahoo mail cyber attack
Seminar on yahoo mail cyber attackrohit2495
 
The Difference between Pharming and Phishing
The Difference between Pharming and PhishingThe Difference between Pharming and Phishing
The Difference between Pharming and PhishingMason Bird
 
phishing and pharming - evil twins
phishing and pharming - evil twinsphishing and pharming - evil twins
phishing and pharming - evil twinsNilantha Piyasiri
 
Guide to hack Facebook Password
Guide to hack Facebook PasswordGuide to hack Facebook Password
Guide to hack Facebook Passwordauspiciousscene42
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Homejaysonstreet
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google AccountLookout
 
CISA Issues Emotet Warning!
CISA Issues Emotet Warning!CISA Issues Emotet Warning!
CISA Issues Emotet Warning!Nicole Payne
 

Mais procurados (19)

How to check a suspicious link without clicking on it?
How to check a suspicious link without clicking on it?How to check a suspicious link without clicking on it?
How to check a suspicious link without clicking on it?
 
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesTrain Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security Breaches
 
Notes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyNotes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and Privacy
 
Sip 140208055023-phpapp02
Sip 140208055023-phpapp02Sip 140208055023-phpapp02
Sip 140208055023-phpapp02
 
How to Detect Email Fraud
How to Detect Email FraudHow to Detect Email Fraud
How to Detect Email Fraud
 
Parent edline instructions
Parent edline instructionsParent edline instructions
Parent edline instructions
 
Webspoofing
WebspoofingWebspoofing
Webspoofing
 
Computer security and ethics
Computer security and ethicsComputer security and ethics
Computer security and ethics
 
Cel1
Cel1Cel1
Cel1
 
Online secuirty
Online secuirtyOnline secuirty
Online secuirty
 
Seminar on yahoo mail cyber attack
Seminar on yahoo mail cyber attackSeminar on yahoo mail cyber attack
Seminar on yahoo mail cyber attack
 
RP Phishing Awareness
RP Phishing Awareness RP Phishing Awareness
RP Phishing Awareness
 
The Difference between Pharming and Phishing
The Difference between Pharming and PhishingThe Difference between Pharming and Phishing
The Difference between Pharming and Phishing
 
phishing and pharming - evil twins
phishing and pharming - evil twinsphishing and pharming - evil twins
phishing and pharming - evil twins
 
Guide to hack Facebook Password
Guide to hack Facebook PasswordGuide to hack Facebook Password
Guide to hack Facebook Password
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Home
 
Phishing 1 vp
Phishing 1 vpPhishing 1 vp
Phishing 1 vp
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account
 
CISA Issues Emotet Warning!
CISA Issues Emotet Warning!CISA Issues Emotet Warning!
CISA Issues Emotet Warning!
 

Destaque

biochimie-paper-final-version
biochimie-paper-final-versionbiochimie-paper-final-version
biochimie-paper-final-versionkamlesh sahu
 
Planificacion publica y_popular
Planificacion publica y_popularPlanificacion publica y_popular
Planificacion publica y_popularMargarita Escobar
 
base de datos
base de datos base de datos
base de datos bandida123
 
Film dokunter
Film dokunterFilm dokunter
Film dokunterMas Jay
 
Self Promotion Sasha Florea // Rockit Awards
Self Promotion Sasha Florea // Rockit AwardsSelf Promotion Sasha Florea // Rockit Awards
Self Promotion Sasha Florea // Rockit AwardsFlorea Alexandru
 
Callpage - generuje do 75% więcej leadów za pomocą szybkiego połączenia zwrot...
Callpage - generuje do 75% więcej leadów za pomocą szybkiego połączenia zwrot...Callpage - generuje do 75% więcej leadów za pomocą szybkiego połączenia zwrot...
Callpage - generuje do 75% więcej leadów za pomocą szybkiego połączenia zwrot...CallPage
 
GreenPeace & Facebook Case Study
GreenPeace & Facebook Case StudyGreenPeace & Facebook Case Study
GreenPeace & Facebook Case StudyPujita Tipnis
 
Premio marketing 2016
Premio marketing 2016Premio marketing 2016
Premio marketing 2016Mattia Monaco
 
Artículo Enrique Maldonado - COMARI
Artículo Enrique Maldonado - COMARIArtículo Enrique Maldonado - COMARI
Artículo Enrique Maldonado - COMARIEnrique Maldonado V.
 
LEÇON 53 – La révision d’aujourd’hui couvre les idées des leçons 11 à 15.
LEÇON 53 – La révision d’aujourd’hui couvre les idées des leçons 11 à 15.LEÇON 53 – La révision d’aujourd’hui couvre les idées des leçons 11 à 15.
LEÇON 53 – La révision d’aujourd’hui couvre les idées des leçons 11 à 15.Pierrot Caron
 
Nova lista de aplicadores junho2014
Nova lista de aplicadores junho2014Nova lista de aplicadores junho2014
Nova lista de aplicadores junho2014AutoHemoterapiaGeral
 

Destaque (14)

biochimie-paper-final-version
biochimie-paper-final-versionbiochimie-paper-final-version
biochimie-paper-final-version
 
Planificacion publica y_popular
Planificacion publica y_popularPlanificacion publica y_popular
Planificacion publica y_popular
 
base de datos
base de datos base de datos
base de datos
 
TzeiraFortune- Resume
TzeiraFortune- ResumeTzeiraFortune- Resume
TzeiraFortune- Resume
 
La interfaz de flash
La interfaz de flashLa interfaz de flash
La interfaz de flash
 
Informe agrícola
Informe agrícolaInforme agrícola
Informe agrícola
 
Film dokunter
Film dokunterFilm dokunter
Film dokunter
 
Self Promotion Sasha Florea // Rockit Awards
Self Promotion Sasha Florea // Rockit AwardsSelf Promotion Sasha Florea // Rockit Awards
Self Promotion Sasha Florea // Rockit Awards
 
Callpage - generuje do 75% więcej leadów za pomocą szybkiego połączenia zwrot...
Callpage - generuje do 75% więcej leadów za pomocą szybkiego połączenia zwrot...Callpage - generuje do 75% więcej leadów za pomocą szybkiego połączenia zwrot...
Callpage - generuje do 75% więcej leadów za pomocą szybkiego połączenia zwrot...
 
GreenPeace & Facebook Case Study
GreenPeace & Facebook Case StudyGreenPeace & Facebook Case Study
GreenPeace & Facebook Case Study
 
Premio marketing 2016
Premio marketing 2016Premio marketing 2016
Premio marketing 2016
 
Artículo Enrique Maldonado - COMARI
Artículo Enrique Maldonado - COMARIArtículo Enrique Maldonado - COMARI
Artículo Enrique Maldonado - COMARI
 
LEÇON 53 – La révision d’aujourd’hui couvre les idées des leçons 11 à 15.
LEÇON 53 – La révision d’aujourd’hui couvre les idées des leçons 11 à 15.LEÇON 53 – La révision d’aujourd’hui couvre les idées des leçons 11 à 15.
LEÇON 53 – La révision d’aujourd’hui couvre les idées des leçons 11 à 15.
 
Nova lista de aplicadores junho2014
Nova lista de aplicadores junho2014Nova lista de aplicadores junho2014
Nova lista de aplicadores junho2014
 

Semelhante a Test Your Internet Security IQ Quiz

How to choose a password that’s hard to crack
How to choose a password that’s hard to crackHow to choose a password that’s hard to crack
How to choose a password that’s hard to crackKlaus Drosch
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is DangerousGihan Dias
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101mateenzero
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness TrainingDenis kisina
 
DTI_Information Security Trainig_07-12-2020.pptx
DTI_Information Security Trainig_07-12-2020.pptxDTI_Information Security Trainig_07-12-2020.pptx
DTI_Information Security Trainig_07-12-2020.pptxabhishekkumar807235
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptxTanvir Amin
 
10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacksNamik Heydarov
 
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018 World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018 Thycotic
 
UserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.pptUserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.pptDiveshK4
 
End User Security Awareness - Information Security
End User Security Awareness - Information SecurityEnd User Security Awareness - Information Security
End User Security Awareness - Information SecurityWorldTrade3
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUBilly Warero
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself OnlineGary Wagnon
 

Semelhante a Test Your Internet Security IQ Quiz (20)

How to choose a password that’s hard to crack
How to choose a password that’s hard to crackHow to choose a password that’s hard to crack
How to choose a password that’s hard to crack
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
DTI_Information Security Trainig_07-12-2020.pptx
DTI_Information Security Trainig_07-12-2020.pptxDTI_Information Security Trainig_07-12-2020.pptx
DTI_Information Security Trainig_07-12-2020.pptx
 
ICT 2.pptx
ICT 2.pptxICT 2.pptx
ICT 2.pptx
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Social Media Safety
Social Media SafetySocial Media Safety
Social Media Safety
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacks
 
Password management
Password managementPassword management
Password management
 
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018 World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
 
UserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.pptUserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.ppt
 
End User Security Awareness - Information Security
End User Security Awareness - Information SecurityEnd User Security Awareness - Information Security
End User Security Awareness - Information Security
 
DoD Social Media Guide
DoD Social Media GuideDoD Social Media Guide
DoD Social Media Guide
 
User security awareness
User security awarenessUser security awareness
User security awareness
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
 

Último

Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLkapoorjyoti4444
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1kcpayne
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noidadlhescort
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture conceptP&CO
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...amitlee9823
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...daisycvs
 

Último (20)

Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 

Test Your Internet Security IQ Quiz

  • 1. Find out just how savvy you are about Internet security and protecting your company’s (and customer’s) data. Test Your Internet Security IQ 1. It’s okay to share passwords with: (Check all that apply.) ¨ Your boss ¨ Your spouse ¨ The hotel manager ¨ Your coworker ¨ Human Resources ¨ None of the above 2. Don’t put confidential business information in email, instant (IM), or text messages; they may not be secure. a. True b. False 3. Which of the following is a strong password? (Check all that apply.) ¨ Password1 ¨ R3dHairH@rse$ky ¨ Your pet’s name ¨ 135791113 ¨ The first letters of each word in a saying, phrase, or other sentence that’s easy for you to remember. 4. If you see a pop-up message like this when you’re on the web, you should: a. Click OK to decide whether it’s a legitimate offer. b. Click Cancel. c. Click the button. d. Press Ctrl + F4 on your keyboard to close it. 5. If you use a public Wi-Fi network (in a café or hotel, for example) that assigns you a password, it’s okay to send confidential business data. a. True b. False 6. How can you help protect data when you’re on the road? a. Lock your laptop and mobile phone with strong passwords and PINs. b. Encrypt sensitive data on all smartphones, laptops, flash drives, and other portable devices. c. Make sure the public Wi-Fi connection encrypts data. d. All of the above. 7. This was a fraudulent phishing message from “Microsoft” to an Outlook user. Give two warning signs that it’s a hoax. Due to the congestion in all Outlook.com users, Outlook would shut down all unused accounts. Confirm your E-mail by filling out your Login Infromation below or your account will be suspended within 24 hours for security reasons . * Username: * Password: * Date of Birth: * Country Or Territory: Warning!!! Account owner that refuses to update his/her account after two weeks of receiving this warning will lose his or her account permanently. All The best, The Outlook.com Team Verify your Account now To Avoid It Closed MorHezi78@adatum.com Confirm our outlook account services. Verify your account now to avoid it closed!! Dear Account User: 1. 2. 8. If you get email or an IM from a manager within your organization asking for sensitive personal information (like a password or your Social Security number), it’s okay to supply it. a. True b. False 9. When it comes to attachments and links in email, instant, or text messages, which tips should you follow?: (Check all that apply.) ¨ If the message comes from someone you know personally, it’s okay to open or click them. ¨ Don’t open or click them if they’re out of context—for example, ilovepinkponies.pdf from your boss. ¨ Look carefully at the link or attachment to decide if it’s safe to click. ¨ Make sure your antivirus software is up to date. ¨ View every one with suspicion. 10. If you’ve installed all the security updates required by your system administrator, you still have to worry about viruses when you click links or open attachments in messages. a. True b. False
  • 2. Answers Smarter Online = Safer Online 1. None of the above. Treat your passwords with as much care as the information they protect. 2. True. Avoid putting confidential information in email unless it is encrypted, or in instant or text messages, which are not reliably secure. 3. Correct: R3dHairH@rse$ky Uses words (RedHairHorseSky) that do not make sense grammatically, but mean something to the person who made up the password. Also, the password is long and mixes capital and lowercase letters, numbers, and symbols. The first letters of each word in a sentence that’s memorable to you—a line of a favorite poem, a popular saying, etc. It’s easy for you to remember, but difficult for others to guess. Incorrect: Password1: This is most common business password and is at the top of criminal lists to test. Your pet’s name. 135791113: Avoid sequences of numbers. 4. (d) Anything you can click in a pop-up message—even the Windows Close button ( )—can be reprogrammed to download malicious software. 5. False. When you use public wireless connections, it’s safer to assume that it’s not secure, so don’t enter any sensitive information or download software. 6. (d) 7. Due to the congestion in all Outlook.com users, Outlook would shut down all unused accounts. Confirm your E-mail by filling out your Login Infromation below or your account will be suspended within 24 hours for security reasons . * Username: * Password: * Date of Birth: * Country Or Territory: Warning!!! Account owner that refuses to update his/her account after two weeks of receiving this warning will lose his or her account permanently. All The best, The Outlook.com Team Verify your Account now To Avoid It Closed MorHezi78@adatum.com Confirm our outlook account services. Verify your account now to avoid it closed!! Dear Account User: Here are some of the answers you might have given: 1 A suspicious email address. (Note that the real email address is not from Outlook.) 2 Generic salutations rather than using your name. 3 Alarmist messages. Criminals try to create a sense of urgency so you’ll respond without thinking. 4 Grammatical errors and misspellings. 5 Requests to verify or update your account, stop payment on a charge, and the like. 8. False. Someone may have broken into the corporate network and sent email from the manager’s account. To verify the legitimacy of the request, call the manager using the number on your phone or contact list, not the one in the message. If it turns out to be fraudulent, let your IT department know. 9. Correct: View every one with suspicion. Don’t open or click them if they’re out of context. Make sure your antivirus software is up to date. 10. True. Even the most effective antivirus software cannot be 100% effective against viruses which show up continuously. 1 2 3 4 5