Prepare for Security Awareness training tests with these questions and answers. This guide covers phishing prevention, password security, data protection, and cybersecurity best practices.

Q: What keeps your computer, phone, and tablet the safest?

Answer: Keeping the operating system (OS) or virus scanning up-to-date.

Q: From the following selections, which is the strongest password?

Answer: Az5@an?D

Q: Malware can be disguised as,

Answer: All of the above.Friendly software like an antivirus program.Random hardware such as a flash drive.Pop-ups, windows, and toolbars.

Q: Business sensitive and confidential information are,

Answer: Treated the same, but are different types of information.

Q: When getting or using information from different areas/departments,

Answer: Respect that areas/departments rules and procedures.

Q: How should you determine if a link in an email is phishing?

Answer: Hover over the link to see where it connects.

Q: How often should passwords be changed?

Answer: Every 90 days.

Q: What is an example of confidential information?

Answer: Medical record.

Q: What is an example of business sensitive information?

Answer: Employment information.

Q: What can result from not correctly using, accessing, sharing, and protecting electronic information?

Answer: All of the above.Law violations.Policy violations.Confidentiality breeches.

Q: If you have questions about Information Security concerns, the best contact is:

Answer: b) The Information Security Department

Q: Who can you share your HonorHealth user name and password with?

Answer: c) No one

Q: What is a key characteristic of a phishing e-mail?

Answer: d) All of the above

Q: Which of the following statements is not true?

Answer: b) Employees may attach a file containing patient information to their personal email address.

Q: A recent information security risk to health care providers is called “phishing”. Phishing occurs when:

Answer: b) A cyber-criminal tries to obtain a person’s username or password by appearing to be a legitimate person or organization.

Q: How do you encrypt an e-mail communication?

Answer: b) Type the words [ENCRYPT] anywhere in the Subject line of the e-mail.

Q: Which of the following is a good information security practice?

Answer: d) Logging off of a computer before leaving it unattended

Q: Phishing could result in:

Answer: d) All of the above

Q: Which of the following is a good way to protect from a phishing attempt:

Answer: d) All of the above.

Q: Which of the following statements is not true?

Answer: d) Users are not accountable for access to confidential information through their user name and password.