Prepare for Security Awareness training tests with these questions and answers. This guide covers phishing prevention, password security, data protection, and cybersecurity best practices.
Q: What keeps your computer, phone, and tablet the safest?
Answer: Keeping the operating system (OS) or virus scanning up-to-date.
Q: From the following selections, which is the strongest password?
Answer: Az5@an?D
Q: Malware can be disguised as,
Answer: All of the above.Friendly software like an antivirus program.Random hardware such as a flash drive.Pop-ups, windows, and toolbars.
Q: Business sensitive and confidential information are,
Answer: Treated the same, but are different types of information.
Q: When getting or using information from different areas/departments,
Answer: Respect that areas/departments rules and procedures.
Q: How should you determine if a link in an email is phishing?
Answer: Hover over the link to see where it connects.
Q: How often should passwords be changed?
Answer: Every 90 days.
Q: What is an example of confidential information?
Answer: Medical record.
Q: What is an example of business sensitive information?
Answer: Employment information.
Q: What can result from not correctly using, accessing, sharing, and protecting electronic information?
Answer: All of the above.Law violations.Policy violations.Confidentiality breeches.
Q: If you have questions about Information Security concerns, the best contact is:
Answer: b) The Information Security Department
Q: Who can you share your HonorHealth user name and password with?
Answer: c) No one
Q: What is a key characteristic of a phishing e-mail?
Answer: d) All of the above
Q: Which of the following statements is not true?
Answer: b) Employees may attach a file containing patient information to their personal email address.
Q: A recent information security risk to health care providers is called “phishing”. Phishing occurs when:
Answer: b) A cyber-criminal tries to obtain a person’s username or password by appearing to be a legitimate person or organization.
Q: How do you encrypt an e-mail communication?
Answer: b) Type the words [ENCRYPT] anywhere in the Subject line of the e-mail.
Q: Which of the following is a good information security practice?
Answer: d) Logging off of a computer before leaving it unattended
Q: Phishing could result in:
Answer: d) All of the above
Q: Which of the following is a good way to protect from a phishing attempt:
Answer: d) All of the above.
Q: Which of the following statements is not true?
Answer: d) Users are not accountable for access to confidential information through their user name and password.