Security & IntelligenceAnswer Key

Information Security Awareness Quiz

19 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

What keeps your computer, phone, and tablet the safest?

ANSWER

Keeping the operating system (OS) or virus scanning up-to-date.

QUESTION 2

From the following selections, which is the strongest password?

ANSWER

Az5@an?D

QUESTION 3

Malware can be disguised as,

ANSWER

All of the above. Friendly software like an antivirus program. Random hardware such as a flash drive. Pop-ups, windows, and toolbars.

QUESTION 4

Business sensitive and confidential information are,

ANSWER

Treated the same, but are different types of information.

QUESTION 5

When getting or using information from different areas/departments,

ANSWER

Respect that areas/departments rules and procedures.

QUESTION 6

How should you determine if a link in an email is phishing?

ANSWER

Hover over the link to see where it connects.

QUESTION 7

How often should passwords be changed?

ANSWER

Every 90 days.

QUESTION 8

What is an example of confidential information?

ANSWER

Medical record.

QUESTION 9

What is an example of business sensitive information?

ANSWER

Employment information.

QUESTION 10

What can result from not correctly using, accessing, sharing, and protecting electronic information?

ANSWER

All of the above. Law violations. Policy violations. Confidentiality breeches.

QUESTION 11

If you have questions about Information Security concerns, the best contact is:

ANSWER

b) The Information Security Department

QUESTION 12

Who can you share your HonorHealth user name and password with?

ANSWER

c) No one

QUESTION 13

What is a key characteristic of a phishing e-mail?

ANSWER

d) All of the above

QUESTION 14

Which of the following statements is not true?

ANSWER

d) Users are not accountable for access to confidential information through their user name and password.

QUESTION 15

A recent information security risk to health care providers is called "phishing". Phishing occurs when:

ANSWER

b) A cyber-criminal tries to obtain a person's username or password by appearing to be a legitimate person or organization.

QUESTION 16

How do you encrypt an e-mail communication?

ANSWER

b) Type the words [ENCRYPT] anywhere in the Subject line of the e-mail.

QUESTION 17

Which of the following is a good information security practice?

ANSWER

d) Logging off of a computer before leaving it unattended

QUESTION 18

Phishing could result in:

ANSWER

d) All of the above

QUESTION 19

Which of the following is a good way to protect from a phishing attempt:

ANSWER

d) All of the above.

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials